Bug Bounty
Researcher (CBBR)
This program is aimed at training cybersecurity enthusiasts in
recognition and reporting of bugs, especially those related to security exploits and vulnerabilities, legally and ethically.
The Certified Bug Bounty Researcher program allows you to quickly start your career in this challenging,
adventurous and rewarding field with hands-on Instructor-led training and virtual labs.
Get started with Bug Bounty programs. Participate with confidence in hackathons and various cybersecurity competitions!
- Course Benefits
- The course is best suited for:
Register with confidence in various hackathons and hacking competitions after doing this course!
-
- Security Researchers
- Students and Professionals keen in bug bounty programs
- Candidates participating in Hackathons
- Teams participating in Security Competitions
- Aspiring security professionals
- Military and police personnel
- Working professionals with Computer knowledge on sabbatical
Rs. 75,000 + GST
Rs. 25,000 + GST (only for certification)
Bug Bounty
Researcher
- Availability : Monthly
- Level : 03
The Cyberverse Advantange
30-days access
to Virtual Labs
Access to e-learning videos
Clean Exit Professional Ethics Certification
Opportunity to participate in exclusive hackathons
Bug Bounty Researcher Certificate
Empanelment at Falcon Level in NSD
BROWSE OUR PLANS
Rs. 75,000+ GST
Live Instructor Led Sessions, Cyberange virtual lab access, Theory + Lab tests, Certification
VALUE ADDITION : PROFESSIONAL ETHICS AT WORKPLACE TRAINING AND CERTIFICATION
Training Dates
- 13 August
- 14 August
- 20 August
- 21 August
- 27 August
- 28 August
- 29 August
- 3rd September
- 4th September
- 10th September
- 11th September
- 17th September
- 18th September
- 24th September
- 1st October
- 2nd October
- 8th October
- 9th October
- 15th October
- 16th October
- 22nd October
- 5th November
- 6th November
- 12th November
- 13th November
- 19th November
- 20th November
- 26th November
- 3rd December
- 4th December
- 10th December
- 11th December
- 17th December
- 18th December
- 24th December
This is a 16 hours (4 weeks) course.
The lectures for each month/batch will be held on the dates mentioned above.
Interest Free EMI Facility available on request
Application Deadline :
One day before the start date of class every month
Program Modules
- Top 10 Rules for Bug Bounties
- What is Bug Bounty & Basics
- VAPT vs Bug Bounty
- Motivation
- Google Dorking
- Become Author of Google Dorks
- OWASP 2013 vs 2017
- XSS & Techniques
- Reflected XSS
- Stored XSS
- DOM XSS
- Burp suite Lab Setup
- Owasp ZAP vs Burp suite
- Authentication Bypass
- OTP Bypass
- Captcha Bypass
- Rate Limiting Attack
- Race Conditions Attacks
- CSRF Attacks & Techniques
- Open Redirect Attacks
- Cross Origin Resource Sharing Attacks
- Click Jacking Attacks
- Sensitive Data Exposure Attacks
- HTML Injection Attacks
- Broken Link Hijacking
- Session Hijacking
- Session Fixation
- Failure to Invalidate Session
- SQL Injection Attacks using SQL map
- Server Side Request Forgery
- Local File Inclusion
- Remote Code Execution
- Wayback archive
- Shodan
- Censys
- Greynoise
- Github Recon
- Automation using bash
- Subdomain Enumeration
- Subdomain Takeovers
- Fuzzing Web Application
- Report writing
- Reporting Templates
- Pentesing / Bug Bounty Checklist
- Mindmaps
- Tips and Tricks
- Ethics in Bug Bounty
- Clean Exit Code of Conduct
- Capstone Project
- How to kick start your bug bounty journey
Our Batches
The lectures for each month/batch will be held on the dates mentioned above.
Interest Free EMI Facility available on request
Application Deadline :
One day before the start date of class every month
Program Modules
- Top 10 Rules for Bug Bounties
- What is Bug Bounty & Basics
- VAPT vs Bug Bounty
- Motivation
- Google Dorking
- Become Author of Google Dorks
- OWASP 2013 vs 2017
- XSS & Techniques
- Reflected XSS
- Stored XSS
- DOM XSS
- Burp suite Lab Setup
- Owasp ZAP vs Burp suite
- Authentication Bypass
- OTP Bypass
- Captcha Bypass
- Rate Limiting Attack
- Race Conditions Attacks
- CSRF Attacks & Techniques
- Open Redirect Attacks
- Cross Origin Resource Sharing Attacks
- Click Jacking Attacks
- Sensitive Data Exposure Attacks
- HTML Injection Attacks
- Broken Link Hijacking
- Session Hijacking
- Session Fixation
- Failure to Invalidate Session
- SQL Injection Attacks using SQL map
- Server Side Request Forgery
- Local File Inclusion
- Remote Code Execution
- Wayback archive
- Shodan
- Censys
- Greynoise
- Github Recon
- Automation using bash
- Subdomain Enumeration
- Subdomain Takeovers
- Fuzzing Web Application
- Report writing
- Reporting Templates
- Pentesing / Bug Bounty Checklist
- Mindmaps
- Tips and Tricks
- Ethics in Bug Bounty
- Clean Exit Code of Conduct
- Capstone Project
- How to kick start your bug bounty journey
Batch start Dates for the next Quarter
The course is for seven days and is scheduled every month. The lectures for each month/batch will be held on the following dates:
3:00 PM - 5:20 PM |
ISAC CERTIFIED Bug Bounty Researcher (ICBBR) – May 2022
- Information Sharing and Analysis Center
- 319A, Logix Technova, Next to Adobe Corporation, Sector 132
The ISAC Certified Bug Bounty Researcher Program is a unique opportunity offered by ISAC to experienced as well as inexperienced cybersecurity enthusiasts to get trained, earn rewards and recognition for reporting bugs, especially those related to security exploits and vulnerabilities, legally and ethically.
The Certified Bug Bounty Researcher program allows you to quickly start your career in this challenging, adventurous and rewarding field with hands-on Instructor-led training and virtual labs.
The course is for seven days and is scheduled every month. The lectures for March month will be held on the following dates:
March 2022
03:00 to 05:00 PM
- 7th May
- 8th May
- 14th May
- 15th May
- 21st May
- 22nd May
- 28th May
Exam – 29th May 2022
Click here to Register now :- https://pages.razorpay.com/Nsdresearcher
3:00 PM - 5:20 PM |
ISAC CERTIFIED Bug Bounty Researcher (ICBBR) – May 2022
- Information Sharing and Analysis Center
- 319A, Logix Technova, Next to Adobe Corporation, Sector 132
The ISAC Certified Bug Bounty Researcher Program is a unique opportunity offered by ISAC to experienced as well as inexperienced cybersecurity enthusiasts to get trained, earn rewards and recognition for reporting bugs, especially those related to security exploits and vulnerabilities, legally and ethically.
The Certified Bug Bounty Researcher program allows you to quickly start your career in this challenging, adventurous and rewarding field with hands-on Instructor-led training and virtual labs.
The course is for seven days and is scheduled every month. The lectures for March month will be held on the following dates:
March 2022
03:00 to 05:00 PM
- 7th May
- 8th May
- 14th May
- 15th May
- 21st May
- 22nd May
- 28th May
Exam – 29th May 2022
Click here to Register now :- https://pages.razorpay.com/Nsdresearcher
3:00 PM - 5:20 PM |
ISAC CERTIFIED Bug Bounty Researcher (ICBBR) – May 2022
- Information Sharing and Analysis Center
- 319A, Logix Technova, Next to Adobe Corporation, Sector 132
The ISAC Certified Bug Bounty Researcher Program is a unique opportunity offered by ISAC to experienced as well as inexperienced cybersecurity enthusiasts to get trained, earn rewards and recognition for reporting bugs, especially those related to security exploits and vulnerabilities, legally and ethically.
The Certified Bug Bounty Researcher program allows you to quickly start your career in this challenging, adventurous and rewarding field with hands-on Instructor-led training and virtual labs.
The course is for seven days and is scheduled every month. The lectures for March month will be held on the following dates:
March 2022
03:00 to 05:00 PM
- 7th May
- 8th May
- 14th May
- 15th May
- 21st May
- 22nd May
- 28th May
Exam – 29th May 2022
Click here to Register now :- https://pages.razorpay.com/Nsdresearcher
3:00 PM - 5:20 PM |
ISAC CERTIFIED Bug Bounty Researcher (ICBBR) – May 2022
- Information Sharing and Analysis Center
- 319A, Logix Technova, Next to Adobe Corporation, Sector 132
The ISAC Certified Bug Bounty Researcher Program is a unique opportunity offered by ISAC to experienced as well as inexperienced cybersecurity enthusiasts to get trained, earn rewards and recognition for reporting bugs, especially those related to security exploits and vulnerabilities, legally and ethically.
The Certified Bug Bounty Researcher program allows you to quickly start your career in this challenging, adventurous and rewarding field with hands-on Instructor-led training and virtual labs.
The course is for seven days and is scheduled every month. The lectures for March month will be held on the following dates:
March 2022
03:00 to 05:00 PM
- 7th May
- 8th May
- 14th May
- 15th May
- 21st May
- 22nd May
- 28th May
Exam – 29th May 2022
Click here to Register now :- https://pages.razorpay.com/Nsdresearcher
You will get weekly assignments and research work to enhance your course understanding.
Application Deadline : One day before the start date of class every month
- Security Researchers
- Students and Professionals keen in bug bounty programs
- Candidates participating in Hackathons
- Teams participating in Security Competitions
- Aspiring security professionals
- Military and police personnel
- The exam consists of MCQ questions and a CTF.
Contact
Shifa Cyclewala
ISAC Certified Instructor Email: shifa [at] isacindia.org Shifa is a web and mobile application developer with a keen interest in cybersecurity field.
Rohit Gautam
ISAC Certified Instructor Email: rohit [at] isacindia.org Rohit is an avid security researcher with a special interest in network exploitation and web application security analysis.
Get NSD Empanelment Today!
Learn everything to get started with Bug Bounty programs.
Participate with confidence in hackathons and various cybersecurity competitions!
Day One
- Top 10 Rules for Bug Bounties
- What is Bug Bounty & Basics
- VAPT vs Bug Bounty
- Motivation
- Google Dorking
- Become Author of Google Dorks
- OWASP 2013 vs 2017
- XSS & Techniques
- Reflected XSS
- Stored XSS
- DOM XSS
Day Two
- Burp suite Lab Setup
- Owasp ZAP vs Burp suite
- Authentication Bypass
- OTP Bypass
- Captcha Bypass
- Rate Limiting Attack
- Race Conditions Attacks
Day Three
- CSRF Attacks & Techniques
- Open Redirect Attacks
- Cross Origin Resource Sharing Attacks
- Click Jacking Attacks
- Sensitive Data Exposure Attacks
Day Four
- HTML Injection Attacks
- Broken Link Hijacking
- Session Hijacking
- Session Fixation
- Failure to Invalidate Session
Day Five
- SQL Injection Attacks using SQL map
- Server Side Request Forgery
- Local File Inclusion
- Remote Code Execution
- Wayback archive
Day Six
- Shodan
- Censys
- Greynoise
- Github Recon
- Automation using bash
- Subdomain Enumeration
- Subdomain Takeovers
Day Seven
- Fuzzing Web Application
- Report writing
- Reporting Templates
- Pentesing / Bug Bounty Checklist
- Mindmaps
- Tips and Tricks
- Ethics in Bug Bounty
- Clean Exit Code of Conduct
- Capstone Project
- How to kick start your bug bounty journey
Course Benefits
The NSD Certified Bug Bounty Researcher allows you to quickly get started with hunting bugs and earning rewards from various bug bounty programs!
Register with confidence in various hackathons and hacking competitions after doing this course!
Mastering the program will set you in the right direction with potential recruiters. Get jobs in cyber security faster with experience in bug bounty hunting!
What you get
Get 30 days access to Cyber Range Virtual Labs – Practice with predefined vulnerable Applications and Kali OS Distribution in the cloud, in an exclusive private network only for you!
Get 60 days access to course videos on the ISAC e-learning portal, updated regularly!
The program includes Clean Exit Professional Ethics Certification that is mandatory for empanelment in the National Security Database. You can review the Bug Bounty Code of Conduct here.
Get listed in the National Security Database program at the Cadet level by completing the Bug Bounty Researcher certification. re.