Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Bug Bounty Evolution - Not Your Grandson's Bug Bounty

Black Hat via YouTube

Overview

This course explores the evolution of bug bounty programs, reflecting on lessons learned since 2010. It discusses the myths surrounding bug bounty programs and explores alternative solutions for hackers. The course covers topics such as the history of bug bounties, vulnerability coordination, organizational commitment, labor laws, big payouts, metrics, vulnerability handling, cybersecurity apprenticeships, and concludes with insights on the future of bug bounty programs. The intended audience for this course includes cybersecurity professionals, bug bounty hunters, security researchers, and individuals interested in the intersection of hacking and cybersecurity.

Syllabus

Intro
The Parable of the Long Spoon
History of Bug Bounty
Vulnerability Coordination maturity model
Organizational commitment
Labor laws
Big payouts
Whats next
Metrics
Vulnerability Handling
Cybersecurity Apprenticeships
Conclusion

Taught by

Black Hat

Reviews

Start your review of Bug Bounty Evolution - Not Your Grandson's Bug Bounty

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.