YoVDO

Bounties and the Software Development Life Cycle

Offered By: OWASP Foundation via YouTube

Tags

Bug Bounty Courses Penetration Testing Courses Application Security Courses Software Development Life Cycle Courses Computer Fraud and Abuse Act Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of bug bounties and their role in the Software Development Life Cycle (SDLC) in this keynote address from OWASP AppSec California 2015. Dive into Katie Moussouris' extensive background and insights on organizational empathy, the differences between bug bounties and penetration testing, and effective vulnerability response strategies. Learn about the three types of bounties, bug reporting trends, and the importance of market timing in bounty programs. Gain valuable knowledge on starting and maintaining an application security program, understanding initial spikes in vulnerability reports, and navigating the legal landscape surrounding the Computer Fraud and Abuse Act (CFAA). Discover how vulnerability information feeds back into the development process and get answers to common questions in the Q&A session.

Syllabus

Intro
Katies background
Organizational empathy
Bug bounties
Bounties vs penetration testing
Vulnerability response
Beautiful
Goals
Three Bounties
Bug Reporting Trends
Giant Check
Total Price
Market Timing
Wrap Up
Getting Started
Application Security Program
Initial Spike
Trends
Goals and Ways
Where does vulnerability information feed back
CFAA
QA


Taught by

OWASP Foundation

Related Courses

Hacker101
HackerOne via Independent
Instagram Ethical Hacking, Account Security, & Bug Bounties
Udemy
Website Hacking / Penetration Testing
Udemy
Hacking Web Applications & Penetration Testing: Web Hacking
Udemy
Top 5 Tools & Tricks for Ethical Hacking & Bug Bounties 2021
Udemy