From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 24,100 courses taught by industry experts.
Bug bounty white hat hacking
From the course: Ethical Hacking: Vulnerability Analysis
Bug bounty white hat hacking
- [Instructor] Industry takes vulnerabilities very seriously as a breach can cause a critical outage or even a catastrophic financial loss. Companies such as Pinterest, Skyscanner, and Jet.com will pay white hat hackers to find vulnerabilities. We know that vulnerability analysis is very important, but the question is, why don't we do it? Well, sometimes the problem is a lack of education. Or for many of us, you may not even know where to begin. Well, there is help. Now, I'm at this webpage hackerone, where you can see that they have a bug bounty program for companies and it gives some basics. If you are a company, what you might pay the hacker to find the vulnerabilities and what you might want in the form of compensation. But if you're just starting your journey to becoming an ethical hacker, or you're a company that needs to train their employees on vulnerability assessments, or even if you're a seasoned white hat…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Common Vulnerability Scoring System5m 10s
-
(Locked)
Common vulnerabilities and exposures3m 36s
-
(Locked)
Outsourcing vulnerability analysis2m 41s
-
(Locked)
Bug bounty white hat hacking3m 19s
-
(Locked)
Challenge: The Temporal metric group1m 36s
-
(Locked)
Solution: The Temporal metric group3m
-
(Locked)
-
-
-