About

This course teaches students Ethical Hacking, Penetration Testing and Bug Bounty Hunting. Enrolling in this course develops a practical understanding of this field. 
Perfect for students seeking a career in cybersecurity!

Learn from the Best

Ethical Hacking Rohit Gautam

A cyber threat fighter from Gujrat Technical University (GTU), Mr. Rohit is on a mission to make the future a safer place. Other than being on the Google Hall of Fame, Mr. Rohit is passionate about dispersing his knowledge to students. With his knowledge, experience, and expertise, become a Certified Ethical Hacker at Skillarena!

Course curriculum

    1. 1. Course Introduction

      FREE PREVIEW
    2. 2. Disclaimer

      FREE PREVIEW
    3. Course Introduction ( Go and review all this course's instructions)

    1. 3. What is OWASP and Injection

    2. 4. What is Broken Authentication

    3. 5. What is Sensitive Data Exposure

    4. 6. What is XML External Entities

    5. 7. What is Broken Access Control

    6. 8. What is Security Misconfiguration

    7. 9. What is Cross Site Scripting (XSS)

    8. 10.What is Insecure Deserialization

    9. 11. What is Using Components with Known Vulnerabilities

    10. 12. What is Insufficient Logging and Monitoring

    11. OWASP Quiz

    1. 13. Burp Suite Proxy Lab Setup

    1. 14. Authentication Bypass Exploitation Live -1

    2. 15. Authentication Bypass Exploitation Live-2

    3. 16. Authentication Bypass Exploitation Live -3

    4. 17. Authentication Bypass Exploitation Live -4

    5. 18. Authentication Bypass Exploitation Live -5

    6. 19. Authentication Bypass Exploitation Captcha

    7. 20. Authentication Bypass to Account Takeover Live -1

    8. 21. Authentication Bypass to Account Takeover Live -2

    9. 22. Authentication Bypass due to OTP Exposure Live -1

    10. 23. Authentication Bypass due to OTP Exposure Live -2

    11. 24. Authentication Bypass 2FA Bypass Live

    12. 25. Authentication Bypass - Email Takeover Live

    13. 26. Authentication Bypass Mitigations

    14. 27. Authentication Bypass Interview Questions and Answers

    15. Authentication Bypass Quiz

    1. 28. No Rate-Limit leads to Account Takeover Live Type-1

    2. 29. No Rate-Limit leads to Account Takeover Live Type -2

    3. 30. No Rate-Limit leads to Account Takeover Live Type -3

    4. 31. No Rate-Limit leads to Account Takeover Live Type -4

    5. 32. No Rate-Limit leads to Account Takeover Live Type -5

    6. 33. No Rate-Limit to Account Takeover Live - Type 6

    7. 34. No Rate-Limit to Account Takeover Live - Type 7

    8. 35. No Rate-Limit Instagram Report Breakdown

    9. Resource

    10. 36. No Rate-Limit Instagram Report Breakdown 2

    11. 37. No Rate Limit Bypass Report Breakdown

    12. 38. No Rate Limit Bypass Report Breakdown 2

    13. 39.No Rate-Limit to Tool Fake IP Practical

    14. 40. No Rate-Limit test on CloudFare

    15. 41. No Rate-Limit Mitigations

    16. 42. No Rate-Limit All Hackerone Reports Breakdown

    17. 43. Burp Alternative: OWASP ZAP Proxy for No RL

    18. Quiz- 3

    19. Course Introduction ( Go and review all this course's instructions)

    1. 44. How XSS Works F

    2. 45. Reflected XSS on Live 1

    3. XSS+Payloads

    4. 46. Reflected XSS on Live 2

    5. 47. Reflected XSS on Live Manual Balancing

    6. 48. Reflected XSS on Live 3 Balanced

    7. 49. XSS on Limited Inputs Live 1

    8. 50. Limited Inputs Live 2

    9. 51. XSS in Request Headers - Live

    10. 52. Reflected XSS Useragent and Caching

    11. 53. Reflected XSS Email Validator Live

    12. 54. Reflected XSS Protection Bypass Live 1 - Base64

    13. 55. Reflected XSS Protection Bypass Live -2

    14. 56. XSS using Spider

    15. 57. XSS Bypass Right Click Disabled

    16. 58. Blind XSS Exploitation

    17. 59. Stored XSS Exploitation Live

    18. 60. DOM XSS Name

    19. 61. DOM XSS Redirect

    20. 62. DOM XSS Index

    21. 63. XSS on Live by Adding Parameters

    22. 64. XSS Mouse on Lab

    23. XSS+Mouse+payloads

    24. 65. XSS Mouse Live

    25. 66. XSS Mouse Events All Types

    26. 67. XSS Polyglots Live

    27. 68. XSS Polyglots Breakdown

    28. 69. XSS Exploitation - URL Redirection

    29. 70. XSS Exploitation - Phishing

    30. 71. XSS Exploitation Cookie Stealer Lab

    31. 72. XSS Exploitation Cookie Stealer Live

    32. 73. XSS Exploitation File Upload Type- 1

    33. 74. XSS Exploitation File Upload Type -2

    34. 75. XSS Exploitation File Upload Type -3

    35. 76. XSS Mitigations

    36. 77. XSS Bonus TIPS and TRICKS

    37. 78. XSS Hackerone ALL Reports Breakdown

    38. 79. XSS Interview Questions and Answers

About this course

  • 123 lessons
  • 9 hours of video content
  • Govt. Recognized Certificate

What You'll Learn

  • Why Ethical Hacking? Look at the Opportunities in this.
  • Why it’s “Ethical” Hacking?
  • OWASP 10 and Fundamentals
  • OWASP Top 10 2013 vs 2017
  • Bug Bounty Hunting - Live
  • Tips and Tricks to hunt bugs
  • BreakDown of Hackerone Reports for better understanding
  • Interview Preparation Questions Answers and Approach
  • Web Application Penetration Testing - Live
  • Become a bug bounty hunters & Hunt on Live Websites
  • Intercept requests using a Burpsuite proxy
  • Gain full control over the target server using Authentication Bypass Attacks
  • Gain full control over the target server using Captcha Bypass Attacks
  • Gain full control over the target server using OTP /2FA Bypass Attacks
  • Discover Vulnerabilities, technologies & services used on the target website.
  • Authentication Bypass Interview Questions and Answers
  • Hunt Basic XSS Vulnerabilities on Live Environments
  • Exploit and perform Account Takeovers on Live websites
  • Authentication Bypass Mitigations and Fixes
  • Authentication Bypass Breakdown of Hackerone Reports
  • Breakdown of No-Rate Limit of all Hackerone Reports by Hackers
  • Hunt Advance XSS Vulnerabilities by Filter and WAF Bypass
  • Hunt Vulnerabilities and Bug Bounty using XSS vulnerabilities.
  • Fix and Mitigations against XSS Vulnerabilities
  • Authentication Bypass Bonus Tips and Tricks
  • Know about XSS Exploitation Cookie Stealer Labs
  • Discover XSS Mitigations 
  • Practical Tips and Tricks for hunting XSS Live
  • Breakdown of XSS of all Hackerone Reports by Hackers
  • Interview Questions and Answers for XSS Attacks
  • Gain full control over the target server using CSRF Attacks
  • Hunt Vulnerabilities using Advance CSRF Techniques
  • Perform Complete Account Takeover using CSRF on Lab
  • Perform Complete Account Takeover using CSRF on Live
  • Hunt Advance CSRF Vulnerabilities by Filter Bypass
  • Learn how to Fix and Mitigations against CSRF Vulnerabilities
  • Learn CSRF Funds Transfer Lab 
  • Know about CSRF password change 
  • Learn Tricks and Tips for CSRF  Live
  • Breakdown of CSRF of all Hackerone Reports by Hackers
  • Interview Questions and Answers for CSRF Attacks
  • Gain full control over the target server using CORS Attacks
  • Hunt Vulnerabilities using Advance CORS Techniques
  • Exfiltrating Sensitive Information by CORS Vulnerability
  • Fix and Mitigations against CORS Vulnerabilities
  • Practical Tips and Tricks for hunting CORS Live
  • Breakdown of CORS of all Hackerone Reports by Hackers
  • Hunt Vulnerabilities using No Rate-Limit Techniques
  • Complete Account Takeover at by No Rate-Limit Vulnerability
  • Fix and Mitigations against No Rate-Limit Vulnerabilities
  • Practical Tips and Tricks for hunting No Rate-Limit Live
  •  Introduction to CSRF Alternative Tools
  • CSRF ALL Hackerone Reports  Breakdown 
  • Interview Questions and answers of CORS
  • Learn CORS Exploitation
  • Discover Bug Bounty - Roadmap for Hackerone
  • Bug Bounty - Roadmap for Bugcrowd
  • Bug Bounty - Roadmap for OpenBugBounty
  • Bug Bounty - Roadmap for NCIIPC (Govt of India)
  • Bug Bounty - Roadmap for RVDP All Programs

What this Course Includes

  • 110 videos
  • 4 downloadable resources
  • Real-Life Projects and activities.
  • Access on mobile, Laptop and TV
  • Lifetime access to videos content.
  • Certificate of completion 
  • Guaranteed Internship 


Requirements

  • Basic IT Skills will help students in better understanding.
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory & Internet Connection 
  • Operating System: Windows / OS X Linux