Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

From CTF to CVE by Joe Gray

Bugcrowd via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course aims to teach learners how to apply concepts from Capture the Flag (CTF) competitions to real-world scenarios, specifically in bug bounties and vulnerability disclosure processes. The course covers topics such as different types of CTFs, commonalities, specialized CTFs, securing a router, and the vulnerability disclosure process. The teaching method includes a breakdown of concepts and real-life examples. This course is intended for cybersecurity professionals interested in enhancing their skills in bug hunting and vulnerability research.

Syllabus

Intro
Who am I
Objectives
Quick definitions
Types of CTF
Where to find CTF
Common CTF commonalities
Specialized CTFs
Kali
Not being realistic
Too vulnerable
gimmicky game
bug bounties
open CTFs
security research
security team
OSWP
How to secure a router
Setup
Password Change
Login
What do we do
DLink
Vulnerability disclosure
Learning the process
DEFCON 404
Cert
Full Disclosure
Not all CTS are garbage
Hacking Glasses
Future Speaking engagements
Questions
Next logical step

Taught by

Bugcrowd

Reviews

Start your review of From CTF to CVE by Joe Gray

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.