Course curriculum

  • 1

    Vulnerability assessment in line with various frameworks Code

    • Recon-ng

    • Role Hijacking

    • Role Hijacking Behind the Scenes

  • 2

    Web Application Pentesting & Ethical Hacking in line with various frameworks

    • WAP class 00

  • 3

    Network Pentesting, and Ethical Hacking in line with various frameworks

    • SNMP Pentesting

  • 4

    WEB APPLICATION PENTESTING WSTG-LABS

    • Introduction and Objectives

    • WSTG Introduction and the start of the journey towards being a Bug Bounty Hunter