Bug Bounties and the Path to Secure Software Development
Offered By: HackerOne via YouTube
Course Description
Overview
Explore the world of bug bounties and secure software development in this 56-minute webinar featuring Scott Crawford, Research Director of Information Security at 451 Research. Learn why implementing a Vulnerability Disclosure Policy is essential, understand its key components, and discover how to create effective documentation. Gain insights into the tangible benefits and potential challenges of integrating bug bounties into your software development process. Delve into strategies for enhancing your software development lifecycle through bug bounties, including communication techniques, vulnerability handling, automation, and success measurement. Engage with expert predictions and participate in a Q&A session to deepen your understanding of this critical aspect of cybersecurity.
Syllabus
Introduction
Why should you care
Testing is only as good
Impact of bug bounties
Is a bug bounties for you
Where do you begin
Starting from the beginning
Vulnerability disclosure policy
Key elements of vulnerability disclosure policy
Vulnerability disclosure guidelines
NTIA template
Communication
Vulnerability Handling
Platform Providers
Automation
Measuring Success
Going Public
Refine
Explore
QA
Circular Feedback Loops
Questions
Quick Insights
Crystal Ball Predictions
Top of Mind Predictions
Taught by
HackerOne
Related Courses
Cybersecurity Capstone ProjectUniversity of Maryland, College Park via Coursera Requirements Gathering for Secure Software Development
University of Colorado System via Coursera Secure Software Development: Verification and More Specialized Topics
Linux Foundation via edX Secure Software Development: Implementation
Linux Foundation via edX Secure Software Development: Requirements, Design, and Reuse
Linux Foundation via edX