)
Settings
Log out
In this portal, we are having more than 55 real-time tasks. Each task has to be completed to finish this course. some tasks are very easy and need only logical thinking and some need real-world problem-solving minds. These tasks give you an insight into how hackers gain access to computer systems and break security by exploiting the vulnerabilities.
Most of the tasks are web-based vulnerabilities and this course helps you to understand the basics of bug bounty and vulnerability assessments. so don't skip any topic, once you learn, try to practice the same in a legal way.
Also, it is helpful if you have your own lab with an attacker operating system and victim system in a virtual box. so that we can learn in a safe way.
we do not encourage you to practice your ethical hacking skills in the wrong way. we will not be responsible for your stupidity.
First learn the topics from the video and then try hacking the tasks with proper instructions. learn to hack legally.