The bearer of this certificate earned 300 total points
by completing secure coding labs through Veracode Security Labs.
Labs are a form of secure code training that
involves hands-on-keyboard
exercises, where users demonstrate their abilities to exploit and patch
code using real applications.

Lauren Upchurch
123dcfdfe0
15 Dec 2022
The following labs were completed toward certification:
Lab Name | Topic Name | Language | Points |
---|---|---|---|
Take Note! | Secure C++ Programming: Heap Overflows | 30 | |
Triple Word Score | Secure C++ Programming: Stack Overflows | 10 | |
Shifty RSA | Secure C++ Programming: Bitwise Shifts | 10 | |
Fix the Sessions | OWASP 1: Broken Access Control | 10 | |
Making Secure Decisions | OWASP 4: Insecure Design | 10 | |
Bad Cookie Challenge | OWASP 1: Broken Access Control | 10 | |
Bugs in Debug | OWASP 2: Cryptographic Failures | 10 | |
Own the Database | OWASP 3: Injection | 10 | |
Parameterize all the things | OWASP 3: Injection | 10 | |
Bobby Tables Challenge | OWASP 3: Injection | 10 | |
Can you see your reflection? | OWASP 3: Injection | 10 | |
Down with Uploads | OWASP 3: Injection | 20 | |
Alert Challenge | OWASP 3: Injection | 10 | |
Persistence Challenge | OWASP 3: Injection | 10 | |
Jot down this key | OWASP 5: Security Misconfiguration | 10 | |
Secret Admin Challenge | OWASP 5: Security Misconfiguration | 10 | |
eXternal Entity (injection) | OWASP 5: Security Misconfiguration | 10 | |
XML is always a... Challenge | OWASP 5: Security Misconfiguration | 10 | |
Suspicious Packages | OWASP 6: Vulnerable and Outdated Components | 10 | |
Outdated Dependencies Challenge | OWASP 6: Vulnerable and Outdated Components | 10 | |
Really, really bad passwords | OWASP 7: Identification and Authentication Failures | 10 | |
Hash it, store it, salt - upgrade it | OWASP 7: Identification and Authentication Failures | 10 | |
Terrible Password Challenge | OWASP 7: Identification and Authentication Failures | 10 | |
In a Pickle | OWASP 8: Software and Data Integrity Failures | 10 | |
Slow Down | OWASP 9: Security Logging and Monitoring Failures | 10 | |
Brute Force Challenge | OWASP 9: Security Logging and Monitoring Failures | 10 | |
Valid Deficit | OWASP 4: Insecure Design | 10 |