YoVDO

Critical Vulnerabilities and Bug Bounty Programs

Offered By: Bugcrowd via YouTube

Tags

Cybersecurity Courses Ethical Hacking Courses Vulnerability Assessment Courses Security Research Courses Bug Hunting Courses

Course Description

Overview

Explore critical vulnerabilities uncovered through bug bounty programs in this Black Hat 2015 presentation by Kymberlee Price. Gain insights into the impact of these vulnerabilities on customers, learn about notable bug bounty programs like Google's Vulnerability Reward Program and Microsoft's Bounty Program, and understand the state of bug bounty reporting. Examine specific bugs and vulnerabilities, including detailed breakdowns and their significance. Discover strategies for collecting essential information, reducing noise in bug reports, and effectively communicating priorities. Evaluate the value of bug bounty programs and their role in vulnerability disclosures. Engage with real-world examples from major tech companies and learn how to improve your own bug hunting and reporting skills.

Syllabus

Introduction
Google Vulnerability Reward Program
Microsoft Bounty Program
State of Bug Bounty Report
Specific Bugs
Peter
Smartsheet
The Bug
Another Vulnerability
Vulnerability Overview
Collecting the Right Information
Example from Facebook
How to reduce noise
Scope documentation
Communicating priorities
Is it worth the hassle
Reducing noise
Vulnerability disclosures
Call to action
Questions


Taught by

Bugcrowd

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX