Vulnerability Assessment Courses
NahamSec via YouTube Recon Methodology for Consistent High-Value Bug Bounties - Interview with Th3G3nt3lman
NahamSec via YouTube SQL Injection Techniques - SQLMap and Hacker101's Photo Gallery CTF
NahamSec via YouTube Live Bug Bounty Recon Session - Creating a Recon Database for Yahoo
NahamSec via YouTube Live Bug Bounty Recon Session on Yahoo - Using Meg, Assetfinder, and Other Tools
NahamSec via YouTube Live Bug Bounty Recon Session on Yahoo - Amass, crt.sh, and Dirsearch
NahamSec via YouTube Your Guide to Burp Suite - Setup and Usage in 30 Minutes
Bugcrowd via YouTube SPI Flash Extraction for Bug Bounty Hunters - LevelUpX Series 13
Bugcrowd via YouTube How I Hacked 55 Banks and Cryptocurrency Exchanges - LevelUpX Series 3
Bugcrowd via YouTube It's Not a Vulnerability, It's a Feature - Exploiting Built-in Functionality
Bugcrowd via YouTube