Bug Bounty training in hackerSlash is a certification and guidance to those individuals who are willing to flourish in the field of cyber-security. For the past few years hackerSlash has established itself as the most renowned institution for cyber-security management. By providing extraordinary services and education to its respective clients.

Taking this opportunity hackerSlash has introduced the Bug Bounty Course currently highest in demand by cyber-security professionals. Being one of the most reliable Institutions to gain knowledge and understanding of cyber-security & ethical hacking hackerSlash has a pool of professional certified ethical hackers who are working as security analysts in different organizations.



What is Bug Bounty?

It is a program organized by several multinationals and tech giants where an individual cyber-security professional will participate and report vulnerabilities (bugs) to an organization in return for getting rewarded with very high compensation. The bugs reported can be the following:

    Security Exploits
    Hardware flaws
    Process Issues




Prerequisites of Bug Bounty course

A student should start with Networking (CCNA), Python Programming Course and then can go for Basic Ethical hacking course or CEHv11 or our SlashOHS course and then can go for specialization on Web Application Security/penetration testing. After which he/she can apply for Bug Bounty Course. 



Course Syllabus

  • Module 1: Introduction to Bug Bounty and Bug Crowd
  • Module 2: Cross-site scripting 
  • Module 3: Command Injection /Execution
  • Module 4: Server Side Request Forgery
  • Module 5: HTML Injection
  • Module 6: File Inclusion (LFI /RFI)
  • Module 7: Directory Traversal
  • Module 8: Insecure CORS Configuration
  • Module 9: Source Code Disclosure
  • Module 10: Missing/insufficient SPF record
  • Module 11: IDS - Script Source Code Disclosure
  • Module 12: HTTP Parameter Pollution Attack
  • Module 13: Hostile Subdomain Takeover
  • Module 14: CRLF Injection
  • Module 15: Host Header Attack
  • Module 16: Parameter Tampering
  • Module 17: URL Redirection / Open Redirection
  • Module 18: Cross Site Request Forgery Attack
  • Module 19: SQL Injection – (Advance SQL Injection )
  • Module 20: File Uploading
  • Module 21: WAF Bypassing
  • Module 22: Critical File Found
  • Module 23: XML External Entity Injection
  • Module 24: Client Side Template Injection
  • Module 25: LDAP Injection
  • Module 26: Documenting & Reporting Vulnerability





3 Months





# 12,000 Taka for Bangladeshi Students

# $200 USD for International Students



Contact us:

Need Technical Assistance? Speak with a support representative by Mailing - hackerslash@icloud.com