Using Components with Known Vulnerabilities
This module discusses use of components with known vulnerabilities (such as libraries and frameworks) that may undermine application defenses and enable various attacks.
OWASP A2 - Broken Authentication
This module covers authentication vulnerabilities and session management.
OWASP A10 - Insufficient Logging and Monitoring
This module covers insufficient logging and monitoring.