You are being redirected! Please, wait...

If you haven't been redirected in 30 seconds, please click this button.

Example Curriculum

  Introduction To Bug Bounty
Available in days
days after you enroll
  Our Virtual Lab Setup
Available in days
days after you enroll
  Website Enumeration & Information Gathering
Available in days
days after you enroll
  Introduction To Burpsuite
Available in days
days after you enroll
  HTML Injection
Available in days
days after you enroll
  Command Injection/Execution
Available in days
days after you enroll
  Broken Authentication
Available in days
days after you enroll
  Bruteforce Attacks
Available in days
days after you enroll
  Sensitive Data Exposure
Available in days
days after you enroll
  Broken Access Control
Available in days
days after you enroll
  Security Misconfiguration
Available in days
days after you enroll
  Cross Site Scripting - XSS
Available in days
days after you enroll
  SQL Injection
Available in days
days after you enroll
  XML, XPath Injection, XXE
Available in days
days after you enroll
  Components With Known Vulnerabilities
Available in days
days after you enroll
  Insufficient Logging And Monitoring
Available in days
days after you enroll
  Monetizing Bug Hunting
Available in days
days after you enroll
  Bonus - Web Developer Fundamentals
Available in days
days after you enroll
  Bonus - Linux Terminal
Available in days
days after you enroll
  Bonus - Networking
Available in days
days after you enroll
  Where To Go From Here?
Available in days
days after you enroll