The bearer of this certificate earned 300 total points
by completing secure coding labs through Veracode Security Labs.
Labs are a form of secure code training that
involves hands-on-keyboard
exercises, where users demonstrate their abilities to exploit and patch
code using real applications.
The following labs were completed toward certification:
| Lab Name | Topic Name | Language | Points |
|---|---|---|---|
| Forging User Requests | OWASP 1: Broken Access Control | 10 | |
| Loose Lips Sink Servers | OWASP 1: Broken Access Control | 10 | |
| Redirect Rodeo | OWASP 1: Broken Access Control | 10 | |
| To Protect and to Serve Secure Cookies | OWASP 1: Broken Access Control | 20 | |
| Fix the Sessions | OWASP 1: Broken Access Control | 10 | |
| Get There from Here | OWASP 1: Broken Access Control | 10 | |
| Secrets in the Log | OWASP 1: Broken Access Control | 10 | |
| Insufficient Entropy | OWASP 4: Cryptographic Failures | 10 | |
| Can you keep a secret? | OWASP 2: Security Misconfiguration | 20 | |
| Jot down this key | OWASP 2: Security Misconfiguration | 10 | |
| Suspicious Packages | OWASP 3: Software Supply Chain Failures | 10 | |
| External Resolution Challenge | OWASP 2: Security Misconfiguration | 10 | |
| Secret Admin Challenge | OWASP 2: Security Misconfiguration | 10 | |
| Bugs in Debug | OWASP 4: Cryptographic Failures | 10 | |
| Own the database | OWASP 5: Injection | 10 | |
| Valid Deficit | OWASP 6: Insecure Design | 10 | |
| Hash it, store it, salt - upgrade it | OWASP 7: Authentication Failures | 10 | |
| Authentication Bypass | OWASP 7: Authentication Failures | 10 | |
| Slow Down | OWASP 9: Security Logging & Alerting Failures | 10 | |
| In a Pickle | OWASP 8: Software or Data Integrity Failures | 10 | |
| Fail Securely | OWASP 10: Mishandling of Exceptional Conditions | 10 | |
| Letting Go of the Outdated | OWASP 3: Software Supply Chain Failures | 10 | |
| Bulky Updates | OWASP 2: Security Misconfiguration | 10 | |
| eXternal Entity (injection) | OWASP 2: Security Misconfiguration | 10 | |
| XML is always a challenge Challenge | OWASP 2: Security Misconfiguration | 10 | |
| Outdated Dependencies Challenge | OWASP 3: Software Supply Chain Failures | 10 | |
| Parameterize all the things | OWASP 5: Injection | 10 | |
| Bobby Tables Challenge | OWASP 5: Injection | 10 | |
| Can you see your reflection? | OWASP 5: Injection | 10 | |
| Making Secure Decisions | OWASP 6: Insecure Design | 10 | |
| Bad Cookie Challenge | OWASP 1: Broken Access Control | 10 |
