What you’ll learn
- Learn 10+ different vulnerability types
- Ability to exploit basic web application vulnerabilities
- Basics of Reconnaissance (recon)
- How to approach a target
- Understand how bug bounties work
- Write better bug bounty reports
- Includes practical hands on labs to practice your skills
- Hack Websites for Ethical Hacking
- Cross-Site Scripting (XSS)
- SQL Injection
- Server-Side Request Forgery (SSRF)
Requirements
- Basic understanding of web technology
- Linux basics
- Reliable internet connection.
Who this course is for:
- Beginners in cybersecurity
- People interested in bug bounty hunting
- Anyone interested in ethical hacking
- Developers looking to expand on their knowledge of vulnerabilities that may impact them
- Anyone interested in application security
- Anyone interested in Red teaming
- Anyone interested in offensive security
- Bug Bounty Hunters
-
- Beginners in cybersecurity
- People interested in bug bounty hunting
- Anyone interested in ethical hacking
- Developers looking to expand on their knowledge of vulnerabilities that may impact them
- Anyone interested in application security
- Anyone interested in Red teaming
- Anyone interested in offensive security
- Bug Bounty Hunters