Bug Bounty: Web Hacking

Skillwise
Course Summary
Did you know you can make money identifying and fixing bugs on some of the biggest web apps on earth? Last year, Facebook paid $5 million to independent hackers while Google paid over $6 million as part of their bug bounty programs. And they're far from alone. In this course, you'll learn how to legally hack major companies like Facebook, Google, and PayPal and get paid to do it. Access 72 lectures & 5.5 hours of content 24/7 Learn how to get paid for hacking & disclosing bugs to major companies Get familiar w/ Burp Suite, browser plugins, & Kali Linux Explore types of vulnerability such as SQL, XSS, CSRF injection, & more Discover the methodology for performing bug bounty
-
+
Course Description
Did you know you can make money identifying and fixing bugs on some of the biggest web apps on earth? Last year, Facebook paid $5 million to independent hackers while Google paid over $6 million as part of their bug bounty programs. And they're far from alone. In this course, you'll learn how to legally hack major companies like Facebook, Google, and PayPal and get paid to do it.
- Access 72 lectures & 5.5 hours of content 24/7
- Learn how to get paid for hacking & disclosing bugs to major companies
- Get familiar w/ Burp Suite, browser plugins, & Kali Linux
- Explore types of vulnerability such as SQL, XSS, CSRF injection, & more
- Discover the methodology for performing bug bounty
His skills include: Android app development, HTML, CSS, PHP, C, C++, JAVA, Linux, Building Custom Linux OS, Cloud Computing. Penetration testing, Kali Linux and Hacking. Details & Requirements- Length of time users can access this course: lifetime
- Access options: web streaming, mobile streaming
- Certification of completion not included
- Redemption deadline: redeem your code within 30 days of purchase
- Experience level required: all levels
- Internet required
- Instant digital redemption
-
+
Course Syllabus
- Let's Get Started
- Tools
- WordPress Hacking
- Cross-site Scripting(XSS)
- SQL Injection(SQLi)
- Clickjacking
- Open Redirect Vulnerablility
- Cross-site Request Forgery(CSRF)
- Full Path Disclosure
- Broken Authentication and Session Management
- HTML Injection
- Sub Domain take Over
- Remote code Execution
- Denail of Service (DoS)
- Methodology
- Let's Get Started
- Tools
- WordPress Hacking
- Cross-site Scripting(XSS)
- SQL Injection(SQLi)
- Clickjacking
- Open Redirect Vulnerablility
- Cross-site Request Forgery(CSRF)
- Full Path Disclosure
- Broken Authentication and Session Management
- HTML Injection
- Sub Domain take Over
- Remote code Execution
- Denail of Service (DoS)
- Methodology