"All cybersecurity certifications from Cyberverse are accompanied by AICTE approved Certification in Professional Ethics at Workplace"

Bug Bounty
Researcher (ICBBR)

This program is aimed at training cybersecurity enthusiasts in 
recognition and reporting of bugs, especially those related to security exploits and vulnerabilities, legally and ethically.

The Certified Bug Bounty Researcher program allows you to quickly start your career in this challenging,
adventurous and rewarding field with hands-on Instructor-led training and virtual labs.

Get started with Bug Bounty programs. Participate with confidence in hackathons and various cybersecurity competitions!

The NSD Empaneled Bug Bounty Researcher Certification allows you to quickly get started with hunting bugs and earning rewards from various bug bounty programs!

Register with confidence in various hackathons and hacking competitions after doing this course!

Mastering the Bug Hunting Skills will set you in the right direction with potential recruiters. Get jobs in cyber security faster with experience in bug bounty hunting!

    1. Security Researchers
    2. Students and Professionals keen in bug bounty programs
    3. Candidates participating in Hackathons
    4. Teams participating in Security Competitions
    5. Aspiring security professionals
    6. Military and police personnel
    7. Working professionals with Computer knowledge on sabbatical

Rs. 75,000 + GST
Rs. 25,000 + GST (only for certification)

Bug Bounty
Researcher

The Cyberverse Advantange

BROWSE OUR PLANS

Select a plan which best suits you and earn your National Security Database Certification

Rs. 75,000+ GST

Live Instructor Led Sessions, Cyberange virtual lab access, Theory + Lab tests, Certification

Rs. 25,000 + GST (only for certification)

Theory Test+ Lab Test

VALUE ADDITION : PROFESSIONAL ETHICS AT WORKPLACE TRAINING AND CERTIFICATION

Training Dates

Standard 6:00 to 08:30 PM

  • 3rd December
  • 4th December
  • 10th December
  • 11th December
  • 17th December
  • 18th December
  • 24th December

EXAM – 7th January 2022

Standard: 3:00PM to 5:30PM

  • 7th January 2023
  • 8th January 2023
  • 14th January 2023
  • 15th January 2023
  • 21st January 2023
  • 22nd January 2023
  • 28th January 2023

EXAM - 4th February 2023

7th, 8th

14th, 15th

21st, 2nd

28th

4th, 5th

11th, 12th

18th, 19th

25th

18th, 19th

25th, 26th

1st, 2nd

8th

15th, 16th

22nd, 23rd

29th, 30th

6th

13th, 14th

20th, 21st

27th, 28th

29th, 30th

3rd, 4th

10th, 11th

17th, 18th

24th, 25th

This is a 16 hours (4 weeks) course.
The lectures for each month/batch will be held on the dates mentioned above.

Interest Free EMI Facility available on request

Application Deadline :
One day before the start date of class every month

21hrs instructor led (3hrs session / day)
15hrs virtual labs
24hrs CTF exam
3hrs MCQ exam
Total : 63hrs

Program Modules

Our Batches

2,3,9,10,16,17,23

6,7,13,14,20,21,27

3,4,10,11,17,18,24

1,2,8,9,5,16,22

5,6,12,13,19,20,26

3,4,10,11,17,18,24

This is a 30 hours (4 weeks) course.
The lectures for each month/batch will be held on the dates mentioned above.

Interest Free EMI Facility available on request

Application Deadline :
One day before the start date of class every month

Program Modules

Batch start Dates for the next Quarter

The course is for seven days and is scheduled every month. The lectures for each month/batch will be held on the following dates:

LOCATION
Information Sharing and Analysis Center
319A, Logix Technova, Next to Adobe Corporation, Sector 132

The ISAC Certified Bug Bounty Researcher Program is a unique opportunity offered by ISAC to experienced as well as inexperienced cybersecurity enthusiasts to get trained, earn rewards and recognition for reporting bugs, especially those related to security exploits and vulnerabilities, legally and ethically.

The Certified Bug Bounty Researcher program allows you to quickly start your career in this challenging, adventurous and rewarding field with hands-on Instructor-led training and virtual labs.

The course is for seven days and is scheduled every month. The lectures for March month will be held on the following dates:

March 2022

03:00 to 05:00 PM

  • 7th May
  • 8th May
  • 14th May
  • 15th May
  • 21st May
  • 22nd May
  • 28th May

Exam – 29th May 2022

Click here to Register now :- https://pages.razorpay.com/Nsdresearcher

LOCATION
Information Sharing and Analysis Center
319A, Logix Technova, Next to Adobe Corporation, Sector 132

The ISAC Certified Bug Bounty Researcher Program is a unique opportunity offered by ISAC to experienced as well as inexperienced cybersecurity enthusiasts to get trained, earn rewards and recognition for reporting bugs, especially those related to security exploits and vulnerabilities, legally and ethically.

The Certified Bug Bounty Researcher program allows you to quickly start your career in this challenging, adventurous and rewarding field with hands-on Instructor-led training and virtual labs.

The course is for seven days and is scheduled every month. The lectures for March month will be held on the following dates:

March 2022

03:00 to 05:00 PM

  • 7th May
  • 8th May
  • 14th May
  • 15th May
  • 21st May
  • 22nd May
  • 28th May

Exam – 29th May 2022

Click here to Register now :- https://pages.razorpay.com/Nsdresearcher

LOCATION
Information Sharing and Analysis Center
319A, Logix Technova, Next to Adobe Corporation, Sector 132

The ISAC Certified Bug Bounty Researcher Program is a unique opportunity offered by ISAC to experienced as well as inexperienced cybersecurity enthusiasts to get trained, earn rewards and recognition for reporting bugs, especially those related to security exploits and vulnerabilities, legally and ethically.

The Certified Bug Bounty Researcher program allows you to quickly start your career in this challenging, adventurous and rewarding field with hands-on Instructor-led training and virtual labs.

The course is for seven days and is scheduled every month. The lectures for March month will be held on the following dates:

March 2022

03:00 to 05:00 PM

  • 7th May
  • 8th May
  • 14th May
  • 15th May
  • 21st May
  • 22nd May
  • 28th May

Exam – 29th May 2022

Click here to Register now :- https://pages.razorpay.com/Nsdresearcher

LOCATION
Information Sharing and Analysis Center
319A, Logix Technova, Next to Adobe Corporation, Sector 132

The ISAC Certified Bug Bounty Researcher Program is a unique opportunity offered by ISAC to experienced as well as inexperienced cybersecurity enthusiasts to get trained, earn rewards and recognition for reporting bugs, especially those related to security exploits and vulnerabilities, legally and ethically.

The Certified Bug Bounty Researcher program allows you to quickly start your career in this challenging, adventurous and rewarding field with hands-on Instructor-led training and virtual labs.

The course is for seven days and is scheduled every month. The lectures for March month will be held on the following dates:

March 2022

03:00 to 05:00 PM

  • 7th May
  • 8th May
  • 14th May
  • 15th May
  • 21st May
  • 22nd May
  • 28th May

Exam – 29th May 2022

Click here to Register now :- https://pages.razorpay.com/Nsdresearcher

You will get weekly assignments and research work to enhance your course understanding. 

Application Deadline : One day before the start date of class every month

  • Security Researchers
  • Students and Professionals keen in bug bounty programs
  • Candidates participating in Hackathons
  • Teams participating in Security Competitions
  • Aspiring security professionals
  • Military and police personnel
  • The exam consists of MCQ questions and a CTF.

Contact

Shifa Cyclewala

ISAC Certified Instructor Email: shifa [at] isacindia.org Shifa is a web and mobile application developer with a keen interest in cybersecurity field.

Rohit Gautam

ISAC Certified Instructor Email: rohit [at] isacindia.org Rohit is an avid security researcher with a special interest in network exploitation and web application security analysis.

Get NSD Empanelment Today!

Learn everything to get started with Bug Bounty programs.
Participate with confidence in hackathons and various cybersecurity competitions!

Day One

    1. Top 10 Rules for Bug Bounties
    2. What is Bug Bounty & Basics
    3. VAPT vs Bug Bounty
    4. Motivation
    5. Google Dorking
    6. Become Author of Google Dorks
    7. OWASP 2013 vs 2017
    8. XSS & Techniques
    9. Reflected XSS
    10. Stored XSS
    11. DOM XSS

Day Two

    1. Burp suite Lab Setup
    2. Owasp ZAP vs Burp suite
    3. Authentication Bypass
    4. OTP Bypass
    5. Captcha Bypass
    6. Rate Limiting Attack
    7. Race Conditions Attacks

Day Three

    1. CSRF Attacks & Techniques
    2. Open Redirect Attacks
    3. Cross Origin Resource Sharing Attacks
    4. Click Jacking Attacks
    5. Sensitive Data Exposure Attacks

Day Four

    1. HTML Injection Attacks
    2. Broken Link Hijacking
    3. Session Hijacking
    4. Session Fixation
    5. Failure to Invalidate Session

Day Five

    1. SQL Injection Attacks using SQL map
    2. Server Side Request Forgery
    3. Local File Inclusion
    4. Remote Code Execution
    5. Wayback archive

Day Six

    1. Shodan
    2. Censys
    3. Greynoise
    4. Github Recon
    5. Automation using bash
    6. Subdomain Enumeration
    7. Subdomain Takeovers

Day Seven

    1. Fuzzing Web Application
    2. Report writing
    3. Reporting Templates
    4. Pentesing / Bug Bounty Checklist
    5. Mindmaps
    6. Tips and Tricks
    7. Ethics in Bug Bounty
    8. Clean Exit Code of Conduct
    9. Capstone Project
    10. How to kick start your bug bounty journey

Course Benefits

The NSD Certified Bug Bounty Researcher allows you to quickly get started with hunting bugs and earning rewards from various bug bounty programs!

Register with confidence in various hackathons and hacking competitions after doing this course!

Mastering the program will set you in the right direction with potential recruiters. Get jobs in cyber security faster with experience in bug bounty hunting!

What you get

Get 30 days access to Cyber Range Virtual Labs - Practice with predefined vulnerable Applications and Kali OS Distribution in the cloud, in an exclusive private network only for you!

Get 60 days access to course videos on the ISAC e-learning portal, updated regularly!

The program includes Clean Exit Professional Ethics Certification that is mandatory for empanelment in the National Security Database. You can review the Bug Bounty Code of Conduct here.

Get listed in the National Security Database program at the Cadet level by completing the Bug Bounty Researcher certification. re.

Ready to get started?

Have any questions?
Get in Touch

Phone Number

Address