About
This course teaches students Ethical Hacking, Penetration Testing and Bug Bounty Hunting. Enrolling in this course develops a practical understanding of this field.
Perfect for students seeking a career in cybersecurity!
Learn from the Best
Ethical Hacking Rohit Gautam
Course curriculum
-
-
Introduction Video
FREE PREVIEW -
Introduction To Bug Bounty Hunting
FREE PREVIEW -
Disclaimer
-
Course Instruction
-
-
-
Future Updates
-
-
-
Burp suite Proxy lab setup
-
What are subdomains done
-
Subdomains Enum done
-
what is DNS.mp4
-
Fastest Resolver .mp4
-
DNS 1 Ready
-
Sublister
-
Findomain
-
Subfinder done
-
Subfinder2 recursive done
-
Can I take Over XYZ done
-
-
-
Can i take over all xyz.mov
-
AWS STKO
-
Aws stko Final 5.mov
-
Aws Stko bugcrowd report breakdown
-
Skto Tumblr
-
Shopify Stko.mov
-
Shopify Stko Part 2.mov
-
cargo stko new.mov
-
subzy done new
-
subjack done new.mov
-
-
-
html basics
-
html
-
html
-
html testphp
-
harvard website
-
QUIZ - 1
-
Course Instruction
-
-
-
Clickjack
-
Clickjack 2
-
Clickjack 3
-
Clickjacking 4
-
Clickjacking tool 5
-
Clickjacking live only exploitation 6
-
Clickjacking tool live
-
Clickjacking burp clickbandir 8
-
About this course
- 113 lessons
- 10.5 hours of video content
What You'll Learn
Introduction Bug Bounty Hunting
Future Updates
Burp Suite Proxy Lab Setup
What are Subdomains
Subdomains enum
What is DNS
Fastest Resolver
Sublister
Findomain
Subfinder
Can I take over XYZ or can I take over all XYZ
AWS Stko
AWS Stko Bugcrowd Report Breakdown
Stko Tumblr
Shopify Stko
Cargo Stko
Subzy
Subjack
HTML basics
HTML
HTML Testphp
Harvard Website
Clickjacking
Clickjacking tool
CJ live only exploitation
Clickjacking Burp Clickbandir
What is LFI
LFI Testphpvulnweb
LFI Basic thecrown.com
LFI ravageband
LFI to RCE
LFI vs RFI 1.1
BLH
BLH tool
BLH instagram report
BLH yourdost.com
BLH gratipay h1 report
BLH deadlinkchecker
BLH extension
BLH command injecction
BLH AWS live
SQL Injection Background Concept
SQL vs Spreadsheets
SQL Database Importance
XAMPP Installation & Setup
SQL Practical Hands on
Truth Table
Truth Table Practical
SQL Understanding the Logic
SQL Query Breakdown
SQL Injection Impact & Approach
SQLi on Lab
SQL Query Breakdown payload
Burp suite Web Academy
SQLi Labs Data Retrieval Lab
SQLi Labs Data Retrieval Live
SQLi Login Bypass Lab
SQLi Login Bypass Live
SQLMap Installation & Setup
SQLMap Exploitation - Live
Shell Exploitation Techniques
SQL : Shell Exploitation - Live
SSRF Introduction & Principle
SSRF Practical
SSRF Bincatcher Listener
SSRF against Server Itself
SSRF against another Backend Server
SSRF Bypass Protection Blacklist Filter
SSRF Bypass Protection Whitelist Filter
SSRF Chaining with Open Redirect and Bypass Filter
SSRF Exploitation using MPEG - Live
SSRF Exploitation JIRA chaining with XSS - Live
SSRF Exploitation JIRA Automation with Python
SSRF Facebook Breakdown
SSRF Microstrategy Live
SSRF PHP Filter Live
SSRF PHP Filter Wordpress Config Live
CVE apache unomi RCE
Bugcrowd RoadMap
HackerOne ROADMAP
OBB RoadMAp
SynAck
Integrity RoadMap
NCIIPC RoadMap
RVDP RoadMap
What this Course Includes
- 104 Video Lectures
- 11 hours on-demand video
- 6 downloadable resources
- 1 quiz
- 1 Final examination
- Real-Life Projects and activities.
- Access on mobile, Laptop, and TV
- Lifetime access to video content.
- Certificate of completion
- Guranteed Internship
Requirements
- Basic IT Skills will help students in better understanding.
- No Linux, programming, or hacking knowledge required.
- Computer with a minimum of 4GB ram/memory & Internet Connection
- Operating System: Windows / Linux