Online Training | HackersEra
 Home / Training / Online Training

Online Training


Bug Bounty Hunting and Penetration Testing Training


Training Details

  • No prerequisites
  • Training will be one on one session and will be delivered via TeamViewer basically Vikash Sir will connect to your machine and will teach you on your end.
  • Everything will be on live websites.
  • Duration for Bug Bounty Hunting: 24-30 Hrs
  • Duration for Penetration Testing: 60 Hrs
  • 2 Hrs per day

About the Course

It is the Penetration Testing Training program, focusing on real world penetration testing in cyber world. This is The Advanced Hacking Techniques Program. We teach to be safe from Hacker who breaks the computer security, network security, Network mobile Security, web application security, cyber forensics etc. for safeguarding from hackers. This enables them to secure their data by hackers. Our Training imparts hacking skills as well defensive techniques as the cyber world organizations need to be safe. All such must be aware of hacking techniques to ensure cyber Security. Our approach is more practical in comparison to theory.


Bug Bounty Hunting


  • Fees: 200 USD
  • Duration: 30 Hours

Penetration Testing


  • Fees: 400 USD
  • Duration: 60 Hours


Training will start after 3 days of payment. Timing will be decided mutually.
+91 9921910319 |   +91 9921910319 |     020 2435 2401

Payment Details

Paypal


Email: vv130295@gmail.com

SWIFT | NEFT Transactions


  • Name: Vikash Kumar Chaudhary
  • Bank Name: Bank Of Baroda
  • Account No: 42520100002441
  • IFSC Code: BARB0VADGAO [Fifth Character of IFSC Code is ZERO]
  • SWIFT Code: BARBINBBPCB
  • Telephone: +91 9921910319


Contents of Bug Hunting

  1. SQL Injection (Advance SQL Injection)
  2. Cross site scripting - 3 types (Reflected/Persistent/DOM)
    2.1 Self XSS to Reflected (by far the most favorite undercover method)
    2.2 Remote File XSS attack
    2.3 XSS attack through File
  3. Command Injection/Execution
  4. Server Side Request Forgery
  5. File Inclusion (LFI/RFI)
  6. Directory Traversal
  7. Source code disclosure
  8. Script Source Code Disclosure
  9. HTTP Parameter Pollution attack
  10. Hostile subdomain takeover
  11. CRLF injection
  12. Host Header Attack
  13. URL Redirection/Open Redirection
  14. Cross site request forgery attack
  15. File uploading
  16. Waf Bypassing
  17. html Injection
  18. client side template injection
  19. LDAP Injection


Contents of Penetration Testing

ADVERTISEMENT