Mastering Burp suite community edition: Bug Hunters perspective
Master the Burp suite to hunt for bugs effectively | Learn all the features of burp suite
At the end of this course, you will get Verifiable "Certificate of completion"
A certificate of completion will be mailed at the end and completion of
all the lessons. It certifies you and proves that you have successfully
completed the course with mastery.
[+] Course at a glance
Welcome to this course! Bug bounty hunting is on the hype nowadays. most security researchers are hunting for bugs and earning bounties in day to day life. it becomes crucial to know the right set of rules and know the right methodologies to hunt for bugs. in most of the cases, researchers uses Burp suite community edition that gives fine-grained tools and strategy to assist in hunting and finding bugs on the target platforms.
In this case, many people who is new to bug bounty hunting is not following the proper approach to get the best results. many people even don't know how to use Burp suite effectively.
This course: Mastering burp suite community edition: bug hunter's perspective is the perfectly focused over how Burp suites can be used in an effective way to enhance the hunter's ability to find more bugs.
This course contains following:
[+] Course materials
- Burp suite's learning (Best for bug hunters)
- 7+ Hours of Videos lessons
- Self-paced HTML/Flash
- Access from PC, TABLETS, SMARTPHONES.
- Online Labs from portswigger
- Online-verifiable Certificate of completion
Course Instructor
Ethical hacker | Penetration tester | Security Evangelist | CISSP | IT AUDITOR | Cyber laws expert | Author | Public speaker |
Having more than 10 years of working experience in information security field.
Have trained more than 90k students on the topic of Information security & penetration testing in classroom mode as well as online. with expertise in web application penetration testing, i have performed several penetration tests and security audits, security analysis with private, governments and security agencies to help assist with to cope with cyber threats.
Course Curriculum
-
StartLab_environments_and_burp_installations (13:30)
-
StartBurp_CA_certificate_for_SSLTLS (8:56)
-
StartBurp_suite_versions_and_academy (6:57)
-
StartBurp_suite_walkthough_-_Basics (15:41)
-
StartIntercepting_proxy_and_site_map_configs (26:47)
-
StartIntercepting_mobile_device_traffics (12:15)
-
StartInvisible_proxying_for_non-proxy_aware_client (11:38)
-
StartAuthentication_bypass_and_information_disclosure_LABs (17:58)
-
StartUsing_HotKeys_for_burp_suite (15:08)
-
StartBurp_Dashboard_and_live_task (16:20)
-
StartBurp_UserOptionsProjectOptions_customisations (21:51)
-
StartRepeater_module_testings (19:06)
-
StartBurp_intruder_Configurations (15:21)
-
StartBurp_Intruder_attack_types_-_Attacks (19:50)
-
StartPayload_processing_and_bruteforcer (9:07)
-
StartGrep-Match__Grep-extract_with_clustor_bomb (26:20)
-
StartSome_Best_payloads_type_used_and_hidden_form_fields (13:30)
-
StartUser_names_generator (9:30)