Justin Borja
Certificate of Achievement awarded to
2025-03-21
Earners of this badge have demonstrated a strong understanding of Software Composition Analysis (SCA) and its role in securing modern applications. They have successfully identified and mitigated vulnerabilities in open-source dependencies using Aikido Security, analyzed real-world exploits like CVE-2022-29078, and understood the risks posed by supply chain attacks. Additionally, they have gained hands-on experience in simulating attacks, investigating database persistence of security flaws, and applying automated fixes to remediate vulnerabilities. This achievement showcases their ability to proactively secure applications by integrating security best practices into the development lifecycle.
0f095212-68eb-4578-8fd8-2bdbede7f1c9
Jay Lazarus Yeras
Founder
Tiger Dojo Technology Group, LLC
Presented by
Jay Lazarus Yeras

Distributed by:

Issued to

Justin Borja

Want to report a typo or a mistake?

Credential Verification

Issue date: March 21, 2025

ID: 0f095212-68eb-4578-8fd8-2bdbede7f1c9

Issued by

Tiger Dojo Technology Group, LLC.

Tiger Dojo offers expert cybersecurity consulting for small businesses. In partnership with Aikido Security, we integrate app security into development workflows without disruption. Protect your assets with our strategic guidance.

Type

Achievement

Level

Introductory

Format

Online

Price

Free

Description

Earners of this badge have demonstrated a strong understanding of Software Composition Analysis (SCA) and its role in securing modern applications. They have successfully identified and mitigated vulnerabilities in open-source dependencies using Aikido Security, analyzed real-world exploits like CVE-2022-29078, and understood the risks posed by supply chain attacks. Additionally, they have gained hands-on experience in simulating attacks, investigating database persistence of security flaws, and applying automated fixes to remediate vulnerabilities. This achievement showcases their ability to proactively secure applications by integrating security best practices into the development lifecycle.

Skills

Application Security

DevSecOps

Security Engineering

Vulnerability Management

Earning Criteria

Participation

Complete "Way of the Ronin" module and submit a PR. Once approved, you will pass. Learn more