Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

An Oral History of Bug Bounty Programs

via YouTube

Overview

This course covers the learning outcomes and goals of bug bounty programs, including the nature of disclosure, vendor-agnostic bounty programs, exploit intelligence marketplace, and lessons from hacking team leaks. The course teaches individual skills such as understanding bug bounty as a service, vulnerability brokers, and the benefits to researchers. The teaching method includes oral history, real-world examples, and case studies. The intended audience for this course is individuals interested in cybersecurity, bug bounty programs, and vulnerability research.

Syllabus

Intro
A bit about me
The Nature of Disclosure
Rain Forest Policy (RFPolicy)
The Trustworthy Computing Memo
Disclosure Drives Action
Remember Netscape?
Vendor Agnostic Bounty Programs
How vendor agnostic bounties work
Bug Bounty as a Service (BBaaS)
Evolving Marketplace
Exploit Intelligence Marketplace
Economy in Action
Lessons from Hacking Team Leak
How to Get Oday: Vulnerability Brokers
Bounty Programs Killing Exploits
Beyond Just Security Patches
Living in the Shadow Brokers Reality
Killing NSA's Tailored Access Operation exploits
Shades of Stuxnet
Killing CIA's Closed Network Infiltration Tool
Pwn2own Inspired Improvements
Benefits to Researchers
Conclusion

Reviews

Start your review of An Oral History of Bug Bounty Programs

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.