Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Before we Start! How to Learn Vulnerabilities? (12:43)
- HTML Injection & (XSS) Cross-site scripting - part 1 (38:07)
- (XSS) Cross-site scripting - part 2 (43:18)
- (XSS) Cross-site scripting - part 3 (21:41)
- CSP & WAF intro (38:40)
- HTML Injection & XSS - Quiz
- HTML Injection - Writeups & Reports (26:58)
- XSS - Writeups & Reports (40:04)
- Cross-Site requests, SOP , CORS - intro (33:21)
- (CSRF) Cross-site Request Forgery - Part 1 (55:29)
- (CSRF) SameSite , Preflight Request and others - Part 2 (43:49)
- CSRF - Quiz
- CSRF - Writeups & Reports (32:52)
- (CORS) Cross-origin Resource Sharing Misconfiguration (51:44)
- CORS misconfiguration - Writeups & Reports (25:22)
- CORS misconfiguration - Quiz
Available in
days
days
after you enroll
- Before we Start! How to Learn Vulnerabilities? (12:43)
- Authentication vs Authorization & Access Control Types (29:36)
- Attacking Access Control - intro (25:13)
- Lab - IDOR vulnerability (35:36)
- IDOR - Writeups & Reports (30:21)
- IDOR - Quiz
- Labs - Privilege Escalation (66:29)
- Privilege Escalation - Writeups & Reports (38:26)
- Privilege Escalation - Quiz
- Logic Bugs - part 1 (38:58)
- Logic Bugs - Writeup (21:20)
- Logic Bugs - Quiz
- Race Condition intro (25:39)
- Race Condition - Writeups & Reports (20:05)
- Race Condition - Quiz
Available in
days
days
after you enroll
- Pentesting Methodology vs Bug Hunting Methodology (15:05)
- What After Learning a Vulnerability? (7:19)
- Basic Recon for what you learned - Part 1 (49:42)
- Basic Recon for what you learned - Part 2 (58:55)
- Automation Basics, How to run scripts? (32:47)
- Methodology: Lab Build (19:38)
- Methodology: Hunting on HTML Injection (18:51)
- Methodology: Hunting on XSS (66:49)
- Methodology: Hunting on CSRF , CORS misconfiguration (44:31)
- Methodology: Hunting on Access Control Bugs & Logic bugs (88:10)
- Bug Bounty Platforms: Concepts, Programs types (81:14)
- Report you Finding! (22:12)
- How to stay updated and track you Learning Curve (10:05)