// Why Opt for Bug Bounty Training?
// 1. Enhances the Value of Your Resume.
// 2. Provides a Money-Making Opportunity during Spare Time.
// 3. Boosts the Likelihood of Securing a Job in the Industry.
// What You'll Receive:
// 1. Comprehensive Training for Two Hours Daily over the Course of One Month, Conducted by Top Trainers.
// 2. Certificate of Completion upon Finishing the Course.
Modules included in this course
Burp Suite
Footprinting
HTML Injection
Burp Suite
Footprinting
HTML Injection
Burp Suite
Footprinting
HTML Injection
Path Traversal
Cross Site Scripting
CSRF
Path Traversal
Cross Site Scripting
CSRF
Path Traversal
Cross Site Scripting
CSRF
SQLI
Parameter Tampering
IDOR
SQLI
Parameter Tampering
IDOR
SQLI
Parameter Tampering
IDOR
Web Cache Deception
File Inclusion
DOS
Web Cache Deception
File Inclusion
DOS
Web Cache Deception
File Inclusion
DOS
Web Cache Poisoning
Web Shelling
More…
Web Cache Poisoning
Web Shelling
More…
Web Cache Poisoning
Web Shelling
More…
Prerequisites for enrolling in this course
// Fundamental IT Skills
// No prior experience necessary in bug hunting
// Computer with at least 4GB of RAM
// Compatible Operating Systems: Windows, Linux
Acheivements
Our Journey in Securing Companies
“We appreciate your sincere efforts for responsibly disclosing this vulnerability to us. As a token of appreciation, we have decided to award you with an E-voucher of ₹₹₹₹”
LICIOUS
“ACT Bug Bounty team extends heartfelt appreciation and gratitude for your valuable and outstanding research. Your contribution has helped cyber-securing millions of lives.”
ACT FIBERNET
“I’m delighted to inform you that you’re being awarded a bounty of ₹₹₹₹ for your exceptional contributions to Yatra. Your hard work has been invaluable, and we’re grateful for your dedication.”
YATRA
“Thank you so much for your bug report. We have accepted the bug under “Medium” severity and it’s fixed now”
OPEN MONEY
“We have concluded our investigation and have taken action to mitigate the issue. We would also like to offer you one of our T- shirts”
BBC
“Thanks again for your report! I’ve updated the internal bug we already had about this issue. We’ll work with the product team to ensure this issue is addressed.”
GOOGLE
“After investigating the bug you submitted, we have found it to be a legitimate threat to Drexel University. We sincerely thank you and appreciate your effort.”