YoVDO

HackerOne Product Walkthrough - Security Team and Researcher Perspectives

Offered By: HackerOne via YouTube

Tags

Vulnerability Management Courses Cybersecurity Courses Ethical Hacking Courses

Course Description

Overview

Explore the HackerOne platform's functionality from both security team and researcher perspectives in this 22-minute product walkthrough video. Join Guy Ben-Simhon as he guides you through key features, including top researchers, security inbox, report filtering, and handling example reports. Learn how to add comments, change report states, issue financial rewards, and manage duplicates. Gain valuable insights into the HackerOne product flow to enhance your understanding of this bug bounty and vulnerability coordination platform.

Syllabus

Intro
Top Researchers
Security Inbox
Filter Reports
Example Report
Adding Comments
Changing the State
Financial Reward
Duplicates
Reports


Taught by

HackerOne

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network