YoVDO

HackerOne Product Walkthrough - Security Team and Researcher Perspectives

Offered By: HackerOne via YouTube

Tags

Vulnerability Management Courses Cybersecurity Courses Ethical Hacking Courses

Course Description

Overview

Explore the HackerOne platform's functionality from both security team and researcher perspectives in this 22-minute product walkthrough video. Join Guy Ben-Simhon as he guides you through key features, including top researchers, security inbox, report filtering, and handling example reports. Learn how to add comments, change report states, issue financial rewards, and manage duplicates. Gain valuable insights into the HackerOne product flow to enhance your understanding of this bug bounty and vulnerability coordination platform.

Syllabus

Intro
Top Researchers
Security Inbox
Filter Reports
Example Report
Adding Comments
Changing the State
Financial Reward
Duplicates
Reports


Taught by

HackerOne

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX