Ethical Hacking Bug Bounty Course
What you'll learn
- Setting Up Your Environment
- Injecting Request Forgery
- Exploiting Through Cross Site Scriptingh
- Header Injection and URL Redirection
- Malicious Files
Requirements
- Basic knowledge of Linux
- Metasploit Framework
Description
The primary goal of this course is to provide you with practical exposure to the world of bug hunting. After taking this course, you will have a better understanding of the approaches (reverse engineering, exploit development) that bug hunters use to find security vulnerabilities. You will learn how to exploit Buffer Overflows on Windows systems. This is an initial course and begins from the very basics of exploitation and is beginner-friendly.
Who this course is for:
- Security researchers
- Anyone else who wants to dive into the exciting world of bug hunting.
Course content
- Preview05:38
- 05:44Setting Up Your Environment
- 06:23Injecting Request Forgery
- 05:52Exploiting Through Cross Site Scriptingh
- 05:35Header Injection and URL Redirection
- 05:52Malicious Files
Instructors
My name is Motin. I am a Computer Science Engineer. Online teaching is my passion. I making videos and teaching online since 2007. I am working on different it fields for more than ten years. Now i want to share my valuable knowledge and experience! In my courses i like to teach in a very easy and simple manner. All of my courses start with basics then i teach some of the advanced topic and at last i give real world examples. My course are easy to learn, informative and updated.
Hello, My name is Marufa Yasmin. I am a professional web developer. I am working as a web developer for a long time and also i have worked for some of the best company of the world. Now i want to share my valuable knowledge using online courses. In my courses i will assume that you have no prior knowledge but at the end you shall learn the subject very well.