bug bounty hunter l - redteamacademy.comoverview of bug bounty hunter a bug bounty program, also...
TRANSCRIPT
Bug BountyHunter
Bug Bounty Hunter
BBH
Overview of Bug Bounty Hunter
A bug bounty program, also called a vulnerability rewards program
(VRP), is a crowdsourcing initiative that rewards individuals for
discovering and reporting software bugs.Many software vendors
and websites run bug bounty programs, paying out cash rewards to
software security researchers and white hat hackers who report
software vulnerabilities that have the potential to be exploited.
After the completion of Bug bounty course from RedTeam Hacker
Academy, you will be aware of different web application vulnerabili-
ties and will understand how a web application works . At the end of
this course, you will be in a position, where you can start doing bug
hunting on different platforms like bugcrowd, hackerone, facebook
and even google.
Course Contents Course Duration - 60 Hrs
01
02
03
04
05
06
07
08
09
10
11
Introduction to Bug bounty and Platforms.
Networking and Linux Basics.
Web basics and its working
Burpsuite 101
Application level attacks
How to recon the target
Advanced Burp for Hunters
Tools of Trade
Methodology for hunting
CTF Games
Responsible Disclosure - Writing reports
Learning Objective
Skill Assessments and Examination
The purpose of Bug Bounty Hunter is to equip the students with adequate knowl-
edge and expertise on participating Bug Bounty Competitions organized by multi
billion companies across the world.
Candidate who successfully completes Hands-on practical tests can write the
examination.
Target groupThis certification is meant for anyone who is interested to learn Information
Security / Application Security
100% placement and Internship Assistance, with partnerships with international organizations
Real time practical oriented training
Industry driven certification
Experienced and globally certified instructors
Ongoing Knowledge Enhancement support and sessions
Free access to Red Team community resources.
Development of soft skills along with technical trainings.
Why choose RedTeam Hacker Academy
Take Away
e-Toolkit
Checklist and play book
Access to RedTeam Cyber Range
Access to RT Knowledge Center & Community
Career Path potentials forsuccessful candidatesAfter successful completion of the course, the candidate wil be able to
function in roles such as
Application Security Engineer
Penetration Tester
Our Recent Placements
Rijas K Abdulla
DXC Technology
Information Security Consultant
Husinul Shanoob
Netsentries Technologies FZCO Dubai
Security Analyst
Minhaj VM
SISA Inforamtion Security,Banglore
Associate Consultant
Arif Ali Khan
Ernst & Young
Risk Advisory Consultant
Rabah Zubair
Paladion Networks Pvt Ltd.
IT SOC Analyst
Anjala Siddique
PwC, Bangalore
Security Analyst
Akash P
SecurEyes Techno Services Pvt. Ltd.
Information Security Consultant
Mohammed Nishad M
CMS IT Services Pvt. Ltd
Associate Consultant - Information Security
Jawad AK
Provise Consulting Pvt Ltd
Cyber Security Analyst.