About

This course teaches students Ethical Hacking, Penetration Testing and Bug Bounty Hunting. Enrolling in this course develops a practical understanding of this field.

 Perfect for students seeking a career in cybersecurity!

Learn from the Best

Ethical Hacking Rohit Gautam

A cyber threat fighter from Gujrat Technical University (GTU), Mr. Rohit is on a mission to make the future a safer place. Other than being on the Google Hall of Fame, Mr. Rohit is passionate about dispersing his knowledge to students. With his knowledge, experience, and expertise, become a Certified Ethical Hacker at Skillarena!

Course curriculum

    1. Future Updates

    1. Burp suite Proxy lab setup

    2. What are subdomains done

    3. Subdomains Enum done

    4. what is DNS.mp4

    5. Fastest Resolver .mp4

    6. DNS 1 Ready

    7. Sublister

    8. Findomain

    9. Subfinder done

    10. Subfinder2 recursive done

    11. Can I take Over XYZ done

    1. Can i take over all xyz.mov

    2. AWS STKO

    3. Aws stko Final 5.mov

    4. Aws Stko bugcrowd report breakdown

    5. Skto Tumblr

    6. Shopify Stko.mov

    7. Shopify Stko Part 2.mov

    8. cargo stko new.mov

    9. subzy done new

    10. subjack done new.mov

    1. html basics

    2. html

    3. html

    4. html testphp

    5. harvard website

    6. QUIZ - 1

    7. Course Instruction

    1. Clickjack

    2. Clickjack 2

    3. Clickjack 3

    4. Clickjacking 4

    5. Clickjacking tool 5

    6. Clickjacking live only exploitation 6

    7. Clickjacking tool live

    8. Clickjacking burp clickbandir 8

About this course

  • 113 lessons
  • 10.5 hours of video content

What You'll Learn

  • Introduction Bug Bounty Hunting

  • Future Updates

  • Burp Suite Proxy Lab Setup

  • What are Subdomains 

  • Subdomains enum 

  • What is DNS

  • Fastest Resolver

  • Sublister

  • Findomain

  • Subfinder

  • Can I take over XYZ or can I take over all XYZ

  • AWS Stko

  • AWS Stko Bugcrowd Report Breakdown

  • Stko Tumblr

  • Shopify Stko

  • Cargo Stko

  • Subzy

  • Subjack

  • HTML basics

  • HTML

  • HTML Testphp

  • Harvard Website

  • Clickjacking

  • Clickjacking tool

  • CJ live only exploitation

  • Clickjacking Burp Clickbandir

  • What is LFI

  • LFI Testphpvulnweb

  • LFI Basic thecrown.com

  • LFI ravageband

  • LFI to RCE 

  • LFI vs RFI 1.1

  • BLH

  • BLH tool

  • BLH instagram report

  • BLH yourdost.com

  • BLH gratipay h1 report

  • BLH deadlinkchecker

  • BLH extension

  • BLH command injecction

  • BLH AWS live 

  • SQL Injection Background Concept

  • SQL vs Spreadsheets

  • SQL Database Importance

  • XAMPP Installation & Setup

  • SQL Practical Hands on 

  • Truth Table

  • Truth Table Practical

  • SQL Understanding the Logic

  • SQL Query Breakdown

  • SQL Injection Impact & Approach

  • SQLi on Lab

  • SQL Query Breakdown payload

  • Burp suite Web Academy

  • SQLi Labs Data Retrieval Lab

  • SQLi Labs Data Retrieval Live

  • SQLi Login Bypass Lab

  • SQLi Login Bypass Live

  • SQLMap Installation & Setup

  • SQLMap Exploitation - Live 

  • Shell Exploitation Techniques

  • SQL : Shell Exploitation - Live 

  • SSRF Introduction & Principle

  • SSRF Practical

  • SSRF Bincatcher Listener

  • SSRF against Server Itself

  • SSRF against another Backend Server

  • SSRF Bypass Protection Blacklist Filter

  • SSRF Bypass Protection Whitelist Filter

  • SSRF Chaining with Open Redirect and Bypass Filter

  • SSRF Exploitation using MPEG - Live

  • SSRF Exploitation JIRA chaining with XSS - Live

  • SSRF Exploitation JIRA Automation with Python

  • SSRF Facebook Breakdown

  • SSRF Microstrategy Live 

  • SSRF PHP Filter Live

  • SSRF PHP Filter Wordpress Config Live

  • CVE apache unomi RCE 

  • Bugcrowd RoadMap

  • HackerOne ROADMAP

  • OBB RoadMAp

  • SynAck

  • Integrity RoadMap

  • NCIIPC RoadMap

  • RVDP RoadMap

What this Course Includes


  • 104 Video Lectures  
  • 11 hours on-demand video
  • 6 downloadable resources
  • 1 quiz 
  • 1 Final examination 
  • Real-Life Projects and activities.
  • Access on mobile, Laptop, and TV
  • Lifetime access to video content.
  • Certificate of completion 
  • Guranteed Internship 

Requirements

  • Basic IT Skills will help students in better understanding.
  • No Linux, programming, or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory & Internet Connection 
  • Operating System: Windows / Linux