Bug Bounty, DEFCON CTF, and Smart Contracts Discussion with ret2jazzy
Offered By: NahamSec via YouTube
Course Description
Overview
Explore the world of cybersecurity in this informative interview with @ret2jazzy, covering bug bounty programs, DEFCON Capture The Flag (CTF) competitions with Perfect Blue (pb_ctf), and smart contract security. Gain insights into the experiences and perspectives of a seasoned security professional as they discuss various aspects of offensive security, red teaming, and ethical hacking. Learn about the challenges and rewards of participating in bug bounty programs, the intricacies of CTF competitions, and the growing importance of smart contract security in the blockchain ecosystem. Enhance your understanding of current trends and best practices in the field of information security through this engaging conversation.
Syllabus
@ret2jazzy Talks About Bug Bounty, DEFCON CTF wtih Perfect Blue (pb_ctf), and Smart Contracts!
Taught by
NahamSec
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network