We found 12 courses available for you
See

Offensive Approach to Hunt Bugs – Bug Bounty Mastery

30 hours
Intermediate

The Offensive Approach to Hunt Bugs – Bug Bounty Mastery …

What you'll learn
Introduction to Bug Bounty Hunting – Understanding platforms like HackerOne & Bugcrowd.
🔹 Setting Up Your Hacking Lab – Configuring Kali Linux, Burp Suite, and essential tools.
🔹 Mastering Web Vulnerabilities (All DVWA Vulnerabilities Covered)
Brute Force Attacks – Cracking login credentials.
Command Injection – Executing system commands remotely.
CSRF (Cross-Site Request Forgery) – Exploiting unauthorized actions.
File Inclusion (LFI & RFI) – Accessing internal files and executing remote scripts.
SQL Injection (SQLi) – Extracting databases & bypassing authentication.
XSS (Cross-Site Scripting) – Exploiting stored, reflected, and DOM-based XSS.
Security Misconfigurations – Identifying weak security implementations.
Broken Authentication & Session Hijacking – Stealing cookies & tokens.
Web Shell Exploitation – Gaining remote access to web servers.
Insecure File Upload – Uploading malicious files for remote access.
🔹 Exploiting DVWA for Web Security Practice
🔹 HackerOne CTF Challenges – Real-world bug bounty training.
🔹 Bugcrowd Platform Analysis – Understanding programs, reports & payouts.
🔹 Writing Professional Bug Reports – Maximizing bounties with high-quality reports.
-17%

Mastering Shell Scripting for Hackers

37 Lessons
30 hours
Intermediate

The Mastering Shell Scripting course at Cyber Yodha is a …

What you'll learn
Understand the fundamentals of Unix/Linux shell scripting.
Learn to write, debug, and optimize shell scripts.
Automate repetitive tasks and improve system management efficiency.
Master the use of various shell commands, utilities, and scripting techniques.
Develop skills to manage files, processes, and system configurations through scripting.

Social Media Hacking 3.0

21 Lessons
27 hours
Beginner

Mastering Social Media Hacking and Android Hacking Explore the world …

What you'll learn
Learn how hackers publish phishing fake websites online
Target all Public Social Media Platforms (Instagram,Facebook,Twitter,Tiktok,Netflix,Google)
Learn advanced techniques to perform phishing attacks
Learn how hackers select perfect phishing fake domain names
Learn how hacker select hosting and purchase domain for realistic hacking
Learn how hackers send fake SMS messages
Learn how to protect yourself from above hacking techniques
Free

Basic Ethical Hacking Course

18 Lessons
30 hours
Intermediate

Course Description: Basic Ethical Hacking Course Unlock the world of …

What you'll learn
Provide an introduction to the ethical and legal considerations of hacking.
Teach the basics of computer networks and their security vulnerabilities.
Offer hands-on experience with some common hacking tools and techniques.
Demonstrate how to identify and exploit vulnerabilities in various systems.
Highlight the importance of securing systems against potential attacks
Alert: You are not allowed to copy content or view source !!