Objective: Learn the basic about on how to get started with Bug Bounty Programs, web applications; how everything works behind the scenes including HTTP Methods, web design patterns, client, and server-side components. and Command Line for both Linux and Windows which comes handy and how to takes good Notes. 1.     Picking Bug Bounty Program
Social Sites and Applications
Web Applications
Mobile and Desktop Applications
Source Code and Executables
Hardware and IoT
2.     Bug Bounty Platforms
Public Programs
Private Programs
Others Non-Listed programs
The Pros and the Cons
Things to Keep in Mind
3.     Basic Web 101
DNS
HTTP Protocol Basics
HTTP Requests and Responses
HTTP Methods
HTTP Status Code
HTTP Headers
HTTP Cookies
Session Management
IP and Ports Address
Encoding
HTML Encoding
URL Encoding
Base64
SSL
Proxy
Authentication
Authorization
4.     Linux Command Line Fun
Searching, Installing, and Removing Tools
The Bash Environment
Piping and Redirection
Text Searching and Manipulation
Other Useful Command
Network Commands
System Info
Editing Files from the Command Line
Downloading Files
Customizing the Bash Environment
5.     Windows Command Line Fun
Basic Usage
Piping and Redirection
Network Commands
System Info
Editing Files from the Command Line
Batch Scripting Practical Examples
Comparing Files
Bash Scripting Practical Examples
Notes Taking
Â
 Module II
Objective: This module focusses on setting up the playground and getting to know better the tools and that we will be using through the modules, also setting up practice labs and other online CTFs which will help up to keep up with the latest way to find the bugs. 7.     Setting Up Playground
Choose and
Setting Up Browser and Proxy
Browser Extensions
8. Tools of Trade
Vulnerable Lab Setup
Capture The Flag
Â
 Module III
Objective: This module focusses on the Top Ten OWASP Vulnerability and we will understand this in great detail with testing methodology, along with understand the importance of automated and manual vulnerability scanning.
11. Understanding OWASP Top 10
A1 Injection Attacks
A2 Broken Authentication
A3 Sensitive Data Exposure
A4 XML External Entity
A5 Broken Access Control
A6 Security Misconfigurations
A7 Cross-Site Scripting
A8 Insecure Deserialization
A9 Using Components with Known Vulnerabilities
A10 Insufficient Logging & Monitoring
12. Vulnerability Scanning
How Vulnerability Scanners Work
Manual Automated Scanning
Authenticated vs Unauthenticated
Practical
Testing Methodology
Module IV
Objective: This is where we will get our hand dirty and will dive into the live application to find the bugs and apply all the above strategy, we have learned so far. We will also try to automate most of the manual task that we have to do using bash and batch scripting we learned.
14. Reconnaissance
Top 15 – Easy to Find Bug
16. Top 10 – Little Efforts
Top 05 – Critical Bug
Automation
 Â
Module V
Objective: This module focussed on writing good report so we can present our self to the team who is going to see the bugs from your perspective.