top of page
bug_bannar.jpg

The Bug Bounty training in India by SGSK is completely focused on making an individual absolutely capable of reporting such issues in a given time limit. So that when they face such competition they can easily handle the pressure for that time and come out with flying colors. SGSK also provides practical in-depth offensive hacking classes from penetration testers. Most of the trained individuals lack certain capabilities which they need in a challenging situation. In this case, SGSK Cyber Security Solutions is helping in filling the relevant gap which was seen commonly among professionals, through this signature Bug bounty certification in India.

BUG BOUNTY

Course Rating | 5.0

Rs- 14999/-

Features

* 80% Lab Module

* Complete OWASP TOP 10 Module

* Learn from LPT(Master)

* Ethical Hacking Knowledge Required

* Genuine Certificate

Rs- 9999/- Only

Benefits

* Supportive Notes

* After Class Support

* 24x7 Support

* Recorded Video Session

* Partly Payment Facility

EXTRA

1) Learn from industry experts who have over 5+ Years Industry Experience

Learn and earn as much as you can.

3) Demand for Bug Hunters is never ending.

4) Become Certified Bug Hunter.

Payment Mode

Partly payment options are available

Registration Fee   -            Rs. 999/-

1st Installment Fee -          Rs. 3000/-

2nd Installment Fee -         Rs. 3000/-

3rd Installment Fee -          Rs. 3000/-

Mobile: 9798112639

10% Off

Extra

Course Content

  • Module 1: Introduction of Bug Bounty

  • Module 2: Cross-site Scripting(XSS)

  • Module 3: Command Injection/Execution

  • Module 4: Server Side Request Forgery(SSRF)

  • Module & HTML Injection

  • Module 6: File Inclusion (LFI /RFT)

  • Module 7: Directory Traversal

  • Module 8: Insecure CORS Configuration

  • Module 9 Source Code Disclosure

  • Module 10: Missing/insufficient SPF record

  • Module 11: Script Source Code Disclosure

  • Module 12: HTTP Parameter Pollution

  • Module 13: Subdomain Takeover

  • Module 14: CRLF Injection

  • Module 15: Host Header Attack

  • Module 16: Parameter Tampering

  • Module 17: URL/Open Redirection

  •  Module 18: Cross Site Request Forgery Attack

  • Module 19: SQL Injection

  • Module 20: File Uploading

  • Module 21: WAF Bypassing

  • Module 22: Critical File Found

  • Module 24: XMI. External Entity Injection

  • Module 25: Client Side Template Injection

  • Module 26: LDAP Injection

  • Module 27: Documenting & Reporting Vulnerability

5

bottom of page