IT & Software

Burp Suite: In Depth Survival Guide

Course Overview

  • Course Title: Burp Suite: In Depth Survival Guide
  • Instructor: Wesley Thijs
  • Target Audience:
    • Security professionals
    • Bug bounty hunters
    • Penetration testers
    • Developers interested in security
  • Prerequisites:
    • HTTP(s) basics
    • Very basic knowledge of Burp Suite
    • Machine with at least 8 GB of memory and 2 CPU cores

Curriculum Highlights

  • Key Topics Covered:
    • The Ins And Outs Of Burp Suite
    • Tips And tricks
    • Bug Bounty Tips
    • Scanning Software
    • Every tab in Burp Suite
    • Top 5 Community and Pro edition extensions
    • Authorize for IDORs and BAC
    • Proxy option "Match and replace"
  • Key Skills Learned:
    • Mastery of Burp Suite for security testing
    • Practical application of Burp Suite in bug bounty hunting
    • Advanced techniques for software scanning
    • Effective use of Burp Suite extensions
    • Understanding and utilizing proxy options

Course Format

  • Duration: 3 hours on-demand video
  • Format: Self-paced online course
  • Resources:
    • 1 practice test
    • Assignments
    • 9 articles
    • 18 downloadable resources
    • Access on mobile and TV
    • Certificate of completion
Get Coupon on Udemy