The bearer of this certificate earned 300 total points
by completing secure coding labs through Veracode Security Labs.
Labs are a form of secure code training that
involves hands-on-keyboard
exercises, where users demonstrate their abilities to exploit and patch
code using real applications.

Michael Dela Cruz
aceb8c980d
02 Aug 2023
The following labs were completed toward certification:
Lab Name | Topic Name | Language | Points |
---|---|---|---|
One ID to Access All Objects [DEPRECATED] | OWASP 2019 API 1: Broken Object Level Authorization [DEPRECATED] | 10 | |
Really, really bad passwords [DEPRECATED] | OWASP 2019 API 2: Broken User Authentication [DEPRECATED] | 10 | |
Bugs in Debug [DEPRECATED] | OWASP 2019 API 3: Excessive Data Exposure [DEPRECATED] | 10 | |
To Protect and To Serve Secure Cookies | OWASP 1: Broken Access Control | 20 | |
Neglected endpoints [DEPRECATED] | OWASP 2019 API 5: Broken Function Level Authorization [DEPRECATED] | 10 | |
Bad Design Compromises Security [DEPRECATED] | OWASP 2019 API 6: Mass Assignment [DEPRECATED] | 10 | |
Making Secure Decisions | OWASP 4: Insecure Design | 10 | |
Sleeping With the Enemy | OWASP 8: Software and Data Integrity Failures | 10 | |
Sleeping With the Enemy | OWASP 8: Software and Data Integrity Failures | 10 | |
Jot down this key [DEPRECATED] | OWASP 2019 API 7: Security Misconfiguration [DEPRECATED] | 10 | |
Own the database [DEPRECATED] | OWASP 2019 API 8: Injection [DEPRECATED] | 10 | |
To Protect and To Serve Secure Cookies | OWASP 1: Broken Access Control | 20 | |
Bugs in Debug | OWASP 2: Cryptographic Failures | 10 | |
Bugs in Debug | OWASP 2: Cryptographic Failures | 10 | |
Own the Database | OWASP 3: Injection | 10 | |
Parameterize all the things | OWASP 3: Injection | 10 | |
Can you see your reflection? | OWASP 3: Injection | 10 | |
Suspicious Packages | OWASP 6: Vulnerable and Outdated Components | 10 | |
Really, really bad passwords | OWASP 7: Identification and Authentication Failures | 10 | |
Unprotected Deployments [DEPRECATED] | OWASP 2019 API 9: Improper Assets Management [DEPRECATED] | 10 | |
The Importance of Logging and Monitoring [DEPRECATED] | OWASP 2019 API 10: Insufficient Logging & Monitoring [DEPRECATED] | 10 | |
Get there from here | OWASP 10: Server-Side Request Forgery | 10 | |
Valid Deficit | OWASP 4: Insecure Design | 10 | |
Denial of Service [DEPRECATED] | OWASP 2019 API 4: Lack of Resources & Rate Limiting [DEPRECATED] | 10 | |
Loose Lips Sink Servers | OWASP 1: Broken Access Control | 10 | |
Valid Deficit | OWASP 4: Insecure Design | 10 | |
Making Secure Decisions | OWASP 4: Insecure Design | 10 | |
Making Secure Decisions | OWASP 4: Insecure Design | 10 |