YoVDO

Bug Bounty Reports - How Do They Work

Offered By: nullcon via YouTube

Tags

nullcon Courses Penetration Testing Courses Report Writing Courses

Course Description

Overview

Discover how to create effective bug bounty reports in this 26-minute conference talk from nullcon Goa 2017. Learn valuable tips from Adam Bacchus, Chief Bounty Officer at HackerOne, on improving your bug reports to achieve quicker turnaround times, build better relationships with security teams, and increase your chances of earning higher bounties. Drawing from his extensive experience in penetration testing and managing bug bounty programs at Snapchat and Google, Bacchus shares best practices for interacting with security teams and answers audience questions. Gain insights from a seasoned professional who is passionate about helping both organizations and hackers succeed in collaborative vulnerability disclosure initiatives to enhance internet security.

Syllabus

nullcon Goa 2017 - Bug Bounty Reports: How Do They Work by Adam Bacchus


Taught by

nullcon

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent