Online Training | HackersEra
 Home / Training / Online Training

Online Training

Bug Bounty Hunting and Penetration Testing Training

Training Details

  • No prerequisites
  • Training will be one on one session and will be delivered via TeamViewer basically Vikash Sir will connect to your machine and will teach you on your end.
  • Everything will be on live websites.
  • Duration for Bug Bounty Hunting: 24-30 Hrs
  • Duration for Penetration Testing: 60 Hrs
  • 2 Hrs per day

About the Course

It is the Penetration Testing Training program, focusing on real world penetration testing in cyber world. This is The Advanced Hacking Techniques Program. We teach to be safe from Hacker who breaks the computer security, network security, Network mobile Security, web application security, cyber forensics etc. for safeguarding from hackers. This enables them to secure their data by hackers. Our Training imparts hacking skills as well defensive techniques as the cyber world organizations need to be safe. All such must be aware of hacking techniques to ensure cyber Security. Our approach is more practical in comparison to theory.

Bug Bounty Hunting

  • Fees: 200 USD
  • Duration: 30 Hours

Penetration Testing

  • Fees: 400 USD
  • Duration: 60 Hours

Training will start after 3 days of payment. Timing will be decided mutually.
+91 9921910319 |   +91 9921910319 |     020 2435 2401

Payment Details



SWIFT | NEFT Transactions

  • Name: Vikash Kumar Chaudhary
  • Bank Name: Bank Of Baroda
  • Account No: 42520100002441
  • IFSC Code: BARB0VADGAO [Fifth Character of IFSC Code is ZERO]
  • Telephone: +91 9921910319

Contents of Bug Hunting

  1. SQL Injection (Advance SQL Injection)
  2. Cross site scripting - 3 types (Reflected/Persistent/DOM)
    2.1 Self XSS to Reflected (by far the most favorite undercover method)
    2.2 Remote File XSS attack
    2.3 XSS attack through File
  3. Command Injection/Execution
  4. Server Side Request Forgery
  5. File Inclusion (LFI/RFI)
  6. Directory Traversal
  7. Source code disclosure
  8. Script Source Code Disclosure
  9. HTTP Parameter Pollution attack
  10. Hostile subdomain takeover
  11. CRLF injection
  12. Host Header Attack
  13. URL Redirection/Open Redirection
  14. Cross site request forgery attack
  15. File uploading
  16. Waf Bypassing
  17. html Injection
  18. client side template injection
  19. LDAP Injection

Contents of Penetration Testing