| Modul 1 | Injection Attacks |
|---|---|
| Einheit 1 | 1/10 - Injection Attacks |
| Modul 2 | Broken Authentication |
| Einheit 1 | 2/10 - Broken Authentication |
| Modul 3 | Sensitive Data Exposure |
| Einheit 1 | 3/10 - Sensitive Data Exposure |
| Modul 4 | ML External Entities |
| Einheit 1 | 4/10 - XML External Entities |
| Modul 5 | Broken Access Control |
| Einheit 1 | 5/10 - Broken Access Control |
| Modul 6 | Security Misconfiguration |
| Einheit 1 | 6/10 - Security Misconfiguration |
| Modul 7 | Cross-Site Scripting (XSS) |
| Einheit 1 | 7/10 - Cross-Site Scripting (XSS) |
| Modul 8 | Insecure Deserialization |
| Einheit 1 | 8/10 - Insecure Deserialization |
| Modul 9 | Using Components With Known Vulnerabilities |
| Einheit 1 | 9/10 - Using Components With Known Vulnerabilities |
| Modul 10 | Insufficient Logging and Monitoring |
| Einheit 1 | 10/10 - Insufficient Logging and Monitoring |