diff --git a/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/100-authentication-authorization.md b/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/100-authentication-authorization.md
index 86ff40eb1..61eb950ee 100644
--- a/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/100-authentication-authorization.md
+++ b/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/100-authentication-authorization.md
@@ -1 +1,9 @@
-# Authentication authorization
\ No newline at end of file
+# Authentication authorization
+
+`Authentication` is the process of verifying that an individual, entity or website is whom it claims to be. Authentication in the context of web applications is commonly performed by submitting a username or ID and one or more items of private information that only a given user should know.
+
+`Authorization` may be defined as "the process of verifying that a requested action or service is approved for a specific entity" (NIST). `Authorization` is distinct from authentication which is the process of verifying an entity's identity. When designing and developing a software solution, it is important to keep these distinctions in mind. A user who has been authenticated (perhaps by providing a username and password) is often not authorized to access every resource and perform every action that is technically possible through a system.
+
+For example, a web app may have both regular users and admins, with the admins being able to perform actions the average user is not privileged to do so, even though they have been authenticated. Additionally, authentication is not always required for accessing resources; an unauthenticated user may be authorized to access certain public resources, such as an image or login page, or even an entire web app.
+
+OWASP Website
\ No newline at end of file
diff --git a/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/101-vulnerability-scanning.md b/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/101-vulnerability-scanning.md
index 4966a3abe..11da5b08c 100644
--- a/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/101-vulnerability-scanning.md
+++ b/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/101-vulnerability-scanning.md
@@ -1 +1,19 @@
-# Vulnerability scanning
\ No newline at end of file
+# Vulnerability Scanning
+
+Vulnerability scanning identifies hosts and host attributes
+(e.g., operating systems, applications, open ports), but it also attempts to identify vulnerabilities rather
+than relying on human interpretation of the scanning results. Many vulnerability scanners are equipped to
+accept results from network discovery and network port and service identification, which reduces the
+amount of work needed for vulnerability scanning.
+
+Also, some scanners can perform their own network
+discovery and network port and service identification. Vulnerability scanning can help identify outdated
+software versions, missing patches, and misconfigurations, and validate compliance with or deviations
+from an organization’s security policy.
+
+This is done by identifying the operating systems and major
+software applications running on the hosts and matching them with information on known vulnerabilities
+stored in the scanners’ vulnerability databases.
+
+Free Content
+NIST Website
\ No newline at end of file
diff --git a/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/102-owasp-10.md b/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/102-owasp-10.md
index 8f0868aeb..19ae28590 100644
--- a/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/102-owasp-10.md
+++ b/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/102-owasp-10.md
@@ -1 +1,28 @@
-# Owasp 10
\ No newline at end of file
+# Owasp 10
+
+The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.
+
+
Globally recognized by developers as the first step towards more secure coding.
+
+Companies should adopt this document and start the process of ensuring that their web applications minimize these risks. Using the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces more secure code.
+
+
+## Top 10 Web Application Security Risks
+
+There are three new categories, four categories with naming and scoping changes, and some consolidation in the Top 10 for 2021.
+
+![Mapping](https://raw.githubusercontent.com/OWASP/www-project-top-ten/master/assets/images/mapping.png)
+
+- [**A01:2021-Broken Access Control**](https://owasp.org/Top10/A01_2021-Broken_Access_Control/) moves up from the fifth position; 94% of applications were tested for some form of broken access control. The 34 Common Weakness Enumerations (CWEs) mapped to Broken Access Control had more occurrences in applications than any other category.
+- [**A02:2021-Cryptographic Failures**](https://owasp.org/Top10/A02_2021-Cryptographic_Failures/) shifts up one position to #2, previously known as Sensitive Data Exposure, which was broad symptom rather than a root cause. The renewed focus here is on failures related to cryptography which often leads to sensitive data exposure or system compromise.
+- [**A03:2021-Injection**](https://owasp.org/Top10/A03_2021-Injection/) slides down to the third position. 94% of the applications were tested for some form of injection, and the 33 CWEs mapped into this category have the second most occurrences in applications. Cross-site Scripting is now part of this category in this edition.
+- [**A04:2021-Insecure Design**](https://owasp.org/Top10/A04_2021-Insecure_Design/) is a new category for 2021, with a focus on risks related to design flaws. If we genuinely want to "move left" as an industry, it calls for more use of threat modeling, secure design patterns and principles, and reference architectures.
+- [**A05:2021-Security Misconfiguration**](https://owasp.org/Top10/A05_2021-Security_Misconfiguration/) moves up from #6 in the previous edition; 90% of applications were tested for some form of misconfiguration. With more shifts into highly configurable software, it's not surprising to see this category move up. The former category for XML External Entities (XXE) is now part of this category.
+- [**A06:2021-Vulnerable and Outdated Components**](https://owasp.org/Top10/A06_2021-Vulnerable_and_Outdated_Components/) was previously titled Using Components with Known Vulnerabilities and is #2 in the Top 10 community survey, but also had enough data to make the Top 10 via data analysis. This category moves up from #9 in 2017 and is a known issue that we struggle to test and assess risk. It is the only category not to have any Common Vulnerability and Exposures (CVEs) mapped to the included CWEs, so a default exploit and impact weights of 5.0 are factored into their scores.
+- [**A07:2021-Identification and Authentication Failures**](https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/) was previously Broken Authentication and is sliding down from the second position, and now includes CWEs that are more related to identification failures. This category is still an integral part of the Top 10, but the increased availability of standardized frameworks seems to be helping.
+- [**A08:2021-Software and Data Integrity Failures**](https://owasp.org/Top10/A08_2021-Software_and_Data_Integrity_Failures/) is a new category for 2021, focusing on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. One of the highest weighted impacts from Common Vulnerability and Exposures/Common Vulnerability Scoring System (CVE/CVSS) data mapped to the 10 CWEs in this category. Insecure Deserialization from 2017 is now a part of this larger category.
+- [**A09:2021-Security Logging and Monitoring Failures**](https://owasp.org/Top10/A09_2021-Security_Logging_and_Monitoring_Failures/) was previously Insufficient Logging & Monitoring and is added from the industry survey (#3), moving up from #10 previously. This category is expanded to include more types of failures, is challenging to test for, and isn't well represented in the CVE/CVSS data. However, failures in this category can directly impact visibility, incident alerting, and forensics.
+- [**A10:2021-Server-Side Request Forgery**](https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/) is added from the Top 10 community survey (#1). The data shows a relatively low incidence rate with above average testing coverage, along with above-average ratings for Exploit and Impact potential. This category represents the scenario where the security community members are telling us this is important, even though it's not illustrated in the data at this time.
+
+Free Content
+OWASP Website
\ No newline at end of file
diff --git a/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/103-attack-vectors.md b/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/103-attack-vectors.md
index 3600c18a4..bde0cb23d 100644
--- a/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/103-attack-vectors.md
+++ b/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/103-attack-vectors.md
@@ -1 +1,6 @@
-# Attack vectors
\ No newline at end of file
+# Attack vectors
+
+This metric reflects the context by which vulnerability exploitation is possible. This metric value (and consequently the Base Score) will be larger the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable component. The assumption is that the number of potential attackers for a vulnerability that could be exploited from across a network is larger than the number of potential attackers that could exploit a vulnerability requiring physical access to a device, and therefore warrants a greater Base Score.
+
+Free Content
+FIRST.org Website
\ No newline at end of file
diff --git a/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/104-secrets-management.md b/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/104-secrets-management.md
index 5cbd7d4c7..d88a820d6 100644
--- a/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/104-secrets-management.md
+++ b/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/104-secrets-management.md
@@ -1 +1,9 @@
-# Secrets management
\ No newline at end of file
+# Secrets Management
+
+Secrets Management is a systematic way of in managing, storing, securing, and retrieving credentials for any systems, database, and other services.
+
+Credentials such as passwords, SSH keys, certificates, API keys, backup codes, and more.
+
+Free Content
+AWS Secrets Management Website
+Vault Website
\ No newline at end of file
diff --git a/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/readme.md b/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/readme.md
index e63cad834..00b23ffb2 100644
--- a/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/readme.md
+++ b/content/roadmaps/113-qa/content/104-qa-non-functional-testing/102-security-testing/readme.md
@@ -1 +1,7 @@
-# Security testing
\ No newline at end of file
+# Security Testing
+
+Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended. Due to the logical limitations of security testing, passing the security testing process is not an indication that no flaws exist or that the system adequately satisfies the security requirements.
+
+Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Security testing as a term has a number of different meanings and can be completed in a number of different ways. As such, a Security Taxonomy helps us to understand these different approaches and meanings by providing a base level to work from.
+
+Security Testing Wiki
\ No newline at end of file
diff --git a/content/roadmaps/113-qa/content/107-qa-monitoring-logs/101-new-relic.md b/content/roadmaps/113-qa/content/107-qa-monitoring-logs/101-new-relic.md
index e3cce1984..ffc20641d 100644
--- a/content/roadmaps/113-qa/content/107-qa-monitoring-logs/101-new-relic.md
+++ b/content/roadmaps/113-qa/content/107-qa-monitoring-logs/101-new-relic.md
@@ -1 +1,7 @@
-# New relic
\ No newline at end of file
+# New Relic
+
+New Relic is an observability platform that helps you build better software. You can bring in data from any digital source so that you can fully understand your system and how to improve it.
+
+Free Content
+New Relic Website
+Learn New Relic
\ No newline at end of file
diff --git a/content/roadmaps/113-qa/content/107-qa-monitoring-logs/102-run-scope.md b/content/roadmaps/113-qa/content/107-qa-monitoring-logs/102-run-scope.md
index ae4bcd8ef..ccf914f85 100644
--- a/content/roadmaps/113-qa/content/107-qa-monitoring-logs/102-run-scope.md
+++ b/content/roadmaps/113-qa/content/107-qa-monitoring-logs/102-run-scope.md
@@ -1 +1,9 @@
-# Run scope
\ No newline at end of file
+# Run scope
+
+A Simple Tool for Monitoring Complex APIs. Verify that the structure and content of your API calls meets your expectations. Powerful and flexible assertions give you total control over defining a successful API call.
+
+Create simple monitors with dynamic data for even the most complex use cases. More than simple string matching, build API validations without any code and use them across local dev, staging and production environments.
+
+Free Content
+Runscope Website
+
diff --git a/content/roadmaps/113-qa/content/107-qa-monitoring-logs/103-sentry.md b/content/roadmaps/113-qa/content/107-qa-monitoring-logs/103-sentry.md
index efc441663..d857b3fa0 100644
--- a/content/roadmaps/113-qa/content/107-qa-monitoring-logs/103-sentry.md
+++ b/content/roadmaps/113-qa/content/107-qa-monitoring-logs/103-sentry.md
@@ -1 +1,6 @@
-# Sentry
\ No newline at end of file
+# Sentry
+
+Sentry tracks your software performance, measuring metrics like throughput and latency, and displaying the impact of errors across multiple systems. Sentry captures distributed traces consisting of transactions and spans, which measure individual services and individual operations within those services.
+
+Free Content
+Sentry Website
\ No newline at end of file
diff --git a/content/roadmaps/113-qa/content/107-qa-monitoring-logs/104-kibana.md b/content/roadmaps/113-qa/content/107-qa-monitoring-logs/104-kibana.md
index d51850013..f92d110aa 100644
--- a/content/roadmaps/113-qa/content/107-qa-monitoring-logs/104-kibana.md
+++ b/content/roadmaps/113-qa/content/107-qa-monitoring-logs/104-kibana.md
@@ -1 +1,7 @@
-# Kibana
\ No newline at end of file
+# Kibana
+
+Kibana is a free and open user interface that lets you visualize your Elasticsearch data and navigate the Elastic Stack. Do anything from tracking query load to understanding the way requests flow through your apps.
+
+Free Content
+Elastic Kibana Website
+Learn Kibana
\ No newline at end of file