YoVDO

Bug Bounty Hunter Job Role Path

Offered By: HTB Academy via Independent

Tags

Bug Bounty Courses Information Gathering Courses Web Application Security Courses

Course Description

Overview

The Bug Bounty Hunter Job Role Path is for individuals who want to enter the world of Bug Bounty Hunting with little to no prior experience. This path covers core web application security assessment and bug bounty hunting concepts and provides a deep understanding of the attack tactics used during bug bounty hunting. Armed with the necessary theoretical background, multiple practical exercises, and a proven bug bounty hunting methodology, students will go through all bug bounty hunting stages, from reconnaissance and bug identification to exploitation, documentation, and communication to vendors/programs. Upon completing this job role path, you will have become proficient in the most common bug bounty hunting and attack techniques against web applications and be in the position of professionally reporting bugs to a vendor.


Syllabus

  1. Web Requests
  2. Introduction to Web Applications
  3. Using Web Proxies
  4. Information Gathering - Web Edition
  5. Attacking Web Applications with Ffuf
  6. JavaScript Deobfuscation
  7. Cross-Site Scripting (XSS)
  8. SQL Injection Fundamentals
  9. SQLMap Essentials
  10. Command Injections
  11. File Upload Attacks
  12. Server-side Attacks
  13. Login Brute Forcing
  14. Broken Authentication
  15. Web Attacks
  16. File Inclusion
  17. Session Security
  18. Web Service & API Attacks
  19. Hacking WordPress
  20. Bug Bounty Hunting Process

Related Courses

Red Hat Certified Specialist in Linux Diagnostics and Troubleshooting Exam Prep (RH342 )
A Cloud Guru
Advanced Information Literacy
State University of New York via Coursera
Developing Feature Stories
University of Cape Town via edX
CJ Report Writing
City College of San Francisco via California Community Colleges System
An Introduction to Ethical Hacking with Kali Linux
Packt via Coursera