2
Most read
AppliedTechnologyAcademy.com
Hack The Box
Certified Bug Bounty
Hunter (HTB CBBH)
Course Overview
Duration
eLearning
Certifications
CBBH
Contact Us
(800) 674-3550
2151 W. Hillsboro Blvd.,
Suite 210
Deerfield Beach, FL 33442
Connect with us
Sign Up Today!
Course Objectives
• Bug Bounty Hunting processes
and methodologies
• Web application/web service
static and dynamic analysis
• Information gathering techniques
• Web application, web service and
API vulnerability identification
and analysis
• Manual and automated
exploitation of various
vulnerability classes
• Vulnerability communication and
reporting
HTB Certified Bug Bounty Hunter
(HTB CBBH) is a highly hands-on
certification that assesses the
candidates’ bug bounty hunting and
web application pentesting skills.
HTB Certified Bug Bounty Hunter
certification holders will possess
technical competency in the bug
bounty hunting and web application
penetration testing domains at an
intermediate level. They will be able
to spot security issues and identify
avenues of exploitation that may
not be immediately apparent from
searching for CVEs or known exploit
PoCs. They can also think outside the
box, chain multiple vulnerabilities
to showcase maximum impact, and
actionably help developers remediate
vulnerabilities through commercial-
grade bug reports.
Target Audience
Entry level Bug Bounty Hunters
Junior Web Application
Penetration Testers
Web Developers
Offensive Security Engineer
Knowledge Domains
• Bug Bounty Hunting processes and
methodologies
• Web application/web service static and
dynamic analysis
• Information gathering techniques
• Web application, web service and API
vulnerability identification and analysis
• Manual and automated exploitation of
various vulnerability classes
• Vulnerability communication and
reporting
AppliedTechnologyAcademy.com
• Web Requests
• Introduction to Web Applications
• Using Web Proxies
• Information Gathering – Web
Edition
• Attacking Web Applications with
Ffuf
• JavaScript Deobfuscation
• Cross-Site Scripting (XSS)
• SQL Injection Fundamentals
• Command Injections
• File Upload Attacks
• Login Brute Forcing
• Broken Authentication
• Web Attacks
• File Inclusion
• Session Security
• Web Service & API Attacks
• Hacking WordPress
• Bug Bounty Hunting Process
Course Outline
Hack The Box
Certified Bug Bounty
Hunter (HTB CBBH)
Key Differentiators
• Continuous Evaluation - To be eligible to start the examination process,
one must have completed all modules of the “Bug Bounty Hunter” job-
role path 100% first. Each module in the path comes with its own hands-
on skills assessment at the end that students must complete to prove
their understanding of the presented topics. The answers to the skills
assessment exercises are not provided. Evaluation takes place throughout
the journey, not only during the examination!
• Hands-on & Real-world Exam Environment - HTB Certified Bug Bounty
Hunter (HTB CBBH) candidates will be required to perform actual
bug hunting activities against multiple real-world applications. HTB
certifications are not based on and do not include multiple-choice
questions!
• Outside-the-box Thinking & Vulnerability Chaining - HTB Certified Bug
Bounty Hunter (HTB CBBH) candidates will be required to think outside
the box and chain multiple vulnerabilities to achieve the exam’s objectives.
Like in real-world engagements, creativity, and in-depth knowledge will
be necessary for a successful outcome.
• Commercial-grade Report Requirement - Successfully completing all bug
bounty hunting activities is not enough to obtain the HTB Certified Bug
Bounty Hunter (HTB CBBH) certification. Candidates will also be required
to compose a commercial-grade report as part of their evaluation. HTB
Certified Bug Bounty Hunter candidates will have to prove they are
market-ready and client-centric professionals.
• Seamless Experience Powered By Pwnbox - The entire exam and
certification process can be conducted through the candidates’ browser,
from start to finish. All bug bounty hunting activities can be performed via
the provided and in-browser Pwnbox. There are no infrastructural or tool
requirements.
The Exam
The candidate will have to perform bug bounty hunting activities against multiple real-world
applications hosted in HTB’s infrastructure and accessible via VPN (using Pwnbox or their own
local VM). Upon starting the examination process, a letter of engagement will be provided that
will clearly state all engagement details, requirements, objectives, and scope. All a candidate
needs to perform the required bug bounty hunting activities is a stable internet connection
and VPN software. HTB Certified Bug Bounty Hunter certification is the most practical
certification for Bug Bounty Hunters that focuses on both bug hunting and professionally
communicating findings.

More Related Content

PDF
Bug Bounty Course in Delhi, India [2025].pdf
PPTX
Bug bounty hunting
PDF
Bug Bounty Blueprint : A Beginner's Guide
PDF
Bug Bounty for Blockchain Projects by Evgenia Broshevan, Project Lead at Hack...
PPTX
Web Application Security And Getting Into Bug Bounties
PDF
Hack The Box at Open Coffee Athens CIV
PDF
Hunting bugs - C0r0n4con
PPTX
bug_bountybug_bountybug_bountybug_bounty.pptx
Bug Bounty Course in Delhi, India [2025].pdf
Bug bounty hunting
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty for Blockchain Projects by Evgenia Broshevan, Project Lead at Hack...
Web Application Security And Getting Into Bug Bounties
Hack The Box at Open Coffee Athens CIV
Hunting bugs - C0r0n4con
bug_bountybug_bountybug_bountybug_bounty.pptx

Recently uploaded (20)

PPTX
GPAT Presentation PPT and details about imp topics.pptx
PDF
CV of Architect Professor A F M Mohiuddin Akhand.pdf
PPTX
Opioid_Analgesics_Presentation (1).pptxp
PPTX
ChandigarhUniversityinformationcareer.pptx
PDF
Beyond the Lab Coat - Perjalanan Karier di Dunia Pasca-Fisika S1
PDF
CollegePresentation.pdf hsjsisjsjsjsssoo
PDF
iTop VPN Crack Latest Version 2025 Free Download With Keygen
PPTX
Core Characteristics and Abilities of an Effective Teacher_0.pptx
PPTX
E-commerce Security and Fraud Issues and Protection
PPT
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
PDF
BPT_Beach_Energy_FY25_half_year_results_presentation.pdf
PPTX
Final Second DC Messeting PPT-Pradeep.M final.pptx
PPT
444174684-Welding-Presentatiohhhn-ppt.ppt
PPTX
CYBER SECURITY PPT.pptx CYBER SECURITY APPLICATION AND USAGE
PPTX
employee on boarding for jobs for freshers try it
PDF
servsafecomprehensive-ppt-full-140617222538-phpapp01.pdf
PDF
202s5_Luciano André Deitos Koslowski.pdf
PPTX
Unit 2 CORPORATE CULTURE AND EXPECTATIONS
PPTX
UNIT 1 about all the important topics that you need
PPTX
formulation and evaluation of polyherbal antiageing cream
GPAT Presentation PPT and details about imp topics.pptx
CV of Architect Professor A F M Mohiuddin Akhand.pdf
Opioid_Analgesics_Presentation (1).pptxp
ChandigarhUniversityinformationcareer.pptx
Beyond the Lab Coat - Perjalanan Karier di Dunia Pasca-Fisika S1
CollegePresentation.pdf hsjsisjsjsjsssoo
iTop VPN Crack Latest Version 2025 Free Download With Keygen
Core Characteristics and Abilities of an Effective Teacher_0.pptx
E-commerce Security and Fraud Issues and Protection
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
BPT_Beach_Energy_FY25_half_year_results_presentation.pdf
Final Second DC Messeting PPT-Pradeep.M final.pptx
444174684-Welding-Presentatiohhhn-ppt.ppt
CYBER SECURITY PPT.pptx CYBER SECURITY APPLICATION AND USAGE
employee on boarding for jobs for freshers try it
servsafecomprehensive-ppt-full-140617222538-phpapp01.pdf
202s5_Luciano André Deitos Koslowski.pdf
Unit 2 CORPORATE CULTURE AND EXPECTATIONS
UNIT 1 about all the important topics that you need
formulation and evaluation of polyherbal antiageing cream

HTB Course syllabus for Ethicfal HAckers

  • 1. AppliedTechnologyAcademy.com Hack The Box Certified Bug Bounty Hunter (HTB CBBH) Course Overview Duration eLearning Certifications CBBH Contact Us (800) 674-3550 2151 W. Hillsboro Blvd., Suite 210 Deerfield Beach, FL 33442 Connect with us Sign Up Today! Course Objectives • Bug Bounty Hunting processes and methodologies • Web application/web service static and dynamic analysis • Information gathering techniques • Web application, web service and API vulnerability identification and analysis • Manual and automated exploitation of various vulnerability classes • Vulnerability communication and reporting HTB Certified Bug Bounty Hunter (HTB CBBH) is a highly hands-on certification that assesses the candidates’ bug bounty hunting and web application pentesting skills. HTB Certified Bug Bounty Hunter certification holders will possess technical competency in the bug bounty hunting and web application penetration testing domains at an intermediate level. They will be able to spot security issues and identify avenues of exploitation that may not be immediately apparent from searching for CVEs or known exploit PoCs. They can also think outside the box, chain multiple vulnerabilities to showcase maximum impact, and actionably help developers remediate vulnerabilities through commercial- grade bug reports. Target Audience Entry level Bug Bounty Hunters Junior Web Application Penetration Testers Web Developers Offensive Security Engineer Knowledge Domains • Bug Bounty Hunting processes and methodologies • Web application/web service static and dynamic analysis • Information gathering techniques • Web application, web service and API vulnerability identification and analysis • Manual and automated exploitation of various vulnerability classes • Vulnerability communication and reporting
  • 2. AppliedTechnologyAcademy.com • Web Requests • Introduction to Web Applications • Using Web Proxies • Information Gathering – Web Edition • Attacking Web Applications with Ffuf • JavaScript Deobfuscation • Cross-Site Scripting (XSS) • SQL Injection Fundamentals • Command Injections • File Upload Attacks • Login Brute Forcing • Broken Authentication • Web Attacks • File Inclusion • Session Security • Web Service & API Attacks • Hacking WordPress • Bug Bounty Hunting Process Course Outline Hack The Box Certified Bug Bounty Hunter (HTB CBBH) Key Differentiators • Continuous Evaluation - To be eligible to start the examination process, one must have completed all modules of the “Bug Bounty Hunter” job- role path 100% first. Each module in the path comes with its own hands- on skills assessment at the end that students must complete to prove their understanding of the presented topics. The answers to the skills assessment exercises are not provided. Evaluation takes place throughout the journey, not only during the examination! • Hands-on & Real-world Exam Environment - HTB Certified Bug Bounty Hunter (HTB CBBH) candidates will be required to perform actual bug hunting activities against multiple real-world applications. HTB certifications are not based on and do not include multiple-choice questions! • Outside-the-box Thinking & Vulnerability Chaining - HTB Certified Bug Bounty Hunter (HTB CBBH) candidates will be required to think outside the box and chain multiple vulnerabilities to achieve the exam’s objectives. Like in real-world engagements, creativity, and in-depth knowledge will be necessary for a successful outcome. • Commercial-grade Report Requirement - Successfully completing all bug bounty hunting activities is not enough to obtain the HTB Certified Bug Bounty Hunter (HTB CBBH) certification. Candidates will also be required to compose a commercial-grade report as part of their evaluation. HTB Certified Bug Bounty Hunter candidates will have to prove they are market-ready and client-centric professionals. • Seamless Experience Powered By Pwnbox - The entire exam and certification process can be conducted through the candidates’ browser, from start to finish. All bug bounty hunting activities can be performed via the provided and in-browser Pwnbox. There are no infrastructural or tool requirements. The Exam The candidate will have to perform bug bounty hunting activities against multiple real-world applications hosted in HTB’s infrastructure and accessible via VPN (using Pwnbox or their own local VM). Upon starting the examination process, a letter of engagement will be provided that will clearly state all engagement details, requirements, objectives, and scope. All a candidate needs to perform the required bug bounty hunting activities is a stable internet connection and VPN software. HTB Certified Bug Bounty Hunter certification is the most practical certification for Bug Bounty Hunters that focuses on both bug hunting and professionally communicating findings.