Learning Platform

Supported Languages

Did you know that 85% of all software security exploits are attributed to just 10 known vulnerabilities?

Supported Languages

The Secure Code Warrior Learning Platform is built on an extensive library of content covering more than 50 language: framework-specific categories, including; Front-end Web, Mobile, Infrastructure-as-Code (IaC), Back-end and API's.Framework specific training is critical to ensure developers learn about the exact APIs and folder, code structure that the specific framework uses to build secure software. Without training in a specific frameworks, developers may fix something that is discouraged using the said framework.

Browse Languages

Java Spring

JAVA - Spring is available in all playing modes and levels, with over 442 playable challenges spread over 59 different categories.

Java: Enterprise Edition (JSF)

JavaServer Faces (JSF) is available with 146 challenges across more than 47 categories.

Java

Java is available with 65 challenges ready for you to play across 37 categories.

GO

GO: Basic is Mixed-Tournament ready with over 184 challenges for you to play, spread across 51 categories.

C# (.NET): Core

C# (.NET): Core is Top 10 Ready with 132 Challenges covering over 35 vulnerability categories to level-up your Secure Coding Skills.

C# (.NET): Web Forms

C# (.NET): Web Forms is available in all modules and levels, with over 382 challenges across 58 different categories.

C# (.NET): MVC

C# MVC is available in all playing modes and levels, with over 461 playable challenges across 59 categories.

C# (.NET): Basic

C# Basic has been introduced, starting with over 71 playable challenges.

JavaScript: Angular.io (2+)

Angular 2+ is available in all playing modes and levels, with over 133 playable challenges.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Supported Frameworks

Over 150 vulnerabilities covered

Our constantly-expanding content library has over 60 language frameworks and covers over 150 types of security vulnerabilities, in more than 8000 coding challenges.

Insufficient Transport Layer Protection (Mobile)
Cross-site Request Forgery
Improper Assets Management
Reverse Engineering
Lack of Resources & Rate Limiting
XML External Entities (XXE)
Mass Assignment
Insecure Data Storage
Sensitive Data Storage
Server-side Request Forgery
Extraneous Functionality
Code Tampering
Client Code Quality
Improper Platform Usage
Lack of Binary Protections
Insufficient Transport Layer Protection
Client Side Injection
Broken Cryptography
Vulnerable Components
Insufficient Logging & Monitoring
Side Channel Vulnerability
Information Exposure
Unintended Data Leakage
Unvalidated Redirects & Forwards
Memory Corruption
Injection Flaws
File Upload Vulnerability
Denial of Service (DoS)
Insecure Authorization
Insecure Authentication
Improper Session Handling
Session Handling
Cross-site Request Forgery
Authentication
Security Misconfiguration
Insecure Cryptography
Business Logic
Cross-Site Scripting (XSS)
Access Control
View all vulnerabilities

Trusted by over 600 enterprises globally

Embrace developer-driven secure coding

Contact us today and make software security an intrinsic part of your development process.