We may earn an affiliate commission when you visit our partners.
Course image
droidcon NYC
In this presentation, Sebastian Porst gives an overview of how to plan and execute on a bug bounty program for your Android app. The information in this talk is based on Sebastian's work on Google Play’s Security Rewards Program, a collaboration with...
Read more
In this presentation, Sebastian Porst gives an overview of how to plan and execute on a bug bounty program for your Android app. The information in this talk is based on Sebastian's work on Google Play’s Security Rewards Program, a collaboration with HackerOne, in which they reward security researchers for security vulnerabilities found in top applications on Google Play.
Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Demonstrates real-world strategies that can help learners in their work
Covers a topic that is relevant to fields including technology, IT, software, and engineering
Taught by Sebastian Porst, who is associated with Google Play’s Security Rewards Program
Examines a topic that may be highly relevant to learners pursuing a career in coding and software development
May help learners prepare for career opportunities in the field of information technology and software development
May require learners to come in with an intermediate skill level in cybersecurity and software development to fully benefit from the course material

Save this course

Save droidcon NYC '19: Setting Up a Bug Bounty Program for Your App to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for droidcon NYC '19: Setting Up a Bug Bounty Program for Your App. These are activities you can do either before, during, or after a course.

Career center

Learners who complete droidcon NYC '19: Setting Up a Bug Bounty Program for Your App will develop knowledge and skills that may be useful to these careers:
Software Engineer
Software Engineers are responsible for designing, developing, and maintaining software systems. This course may be useful for Software Engineers who want to learn more about how to plan and execute on a bug bounty program for their Android app.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful for Information Security Analysts who want to learn more about how to plan and execute on a bug bounty program for their organization's Android app.
Security Consultant
Security Consultants are responsible for providing advice and guidance to organizations on how to improve their security posture. This course may be useful for Security Consultants who want to learn more about how to plan and execute on a bug bounty program for their clients' Android apps.
Incident Responder
Incident Responders are responsible for responding to and recovering from security incidents. This course may be useful for Incident Responders who want to learn more about how to plan and execute on a bug bounty program for their organization's Android app.
Quality Assurance Engineer
Quality Assurance Engineers are responsible for testing software to ensure that it meets quality standards. This course may be useful for Quality Assurance Engineers who want to learn more about how to plan and execute on a bug bounty program for their Android app.
Digital Forensics Analyst
Digital Forensics Analysts are responsible for investigating and analyzing digital evidence. This course may be useful for Digital Forensics Analysts who want to learn more about how to plan and execute on a bug bounty program for their organization's Android app.
Penetration Tester
Penetration Testers are responsible for testing an organization's security by simulating an attack from a malicious actor. This course may be useful for Penetration Testers who want to learn more about how to plan and execute on a bug bounty program for their Android app.
Security Architect
Security Architects are responsible for designing and implementing security solutions for an organization. This course may be useful for Security Architects who want to learn more about how to plan and execute on a bug bounty program for their organization's Android app.
Vulnerability Manager
Vulnerability Managers are responsible for managing and tracking vulnerabilities in an organization's systems. This course may be useful for Vulnerability Managers who want to learn more about how to plan and execute on a bug bounty program for their organization's Android app.
Security Researcher
A Security Researcher is a professional responsible for finding and reporting vulnerabilities in software and systems. This course may be useful for Security Researchers who want to learn more about how to plan and execute on a bug bounty program for their Android app.
Threat Intelligence Analyst
Threat Intelligence Analysts are responsible for gathering and analyzing information about threats to an organization. This course may be useful for Threat Intelligence Analysts who want to learn more about how to plan and execute on a bug bounty program for their organization's Android app.
Chief Information Security Officer
Chief Information Security Officers (CISOs) are responsible for overseeing an organization's information security program. This course may be useful for CISOs who want to learn more about how to plan and execute on a bug bounty program for their organization's Android app.
Security Operations Center Analyst
Security Operations Center Analysts (SOC Analysts) are responsible for monitoring and responding to security incidents. This course may be useful for SOC Analysts who want to learn more about how to plan and execute on a bug bounty program for their organization's Android app.
Product Security Manager
Product Security Managers are responsible for ensuring the security of a product or service. This course may be useful for Product Security Managers who want to learn more about how to plan and execute on a bug bounty program for their product's Android app.
Bug Bounty Hunter
Bug Bounty Hunters are independent security researchers who find and report vulnerabilities in software and systems in exchange for a reward. This course may be useful for Bug Bounty Hunters who want to learn more about how to plan and execute on a bug bounty program for their Android app.

Reading list

We haven't picked any books for this reading list yet.
Provides a broad overview of software security testing, including bug bounties. It good resource for anyone who wants to learn more about the different aspects of software security testing.
Provides a deep dive into the techniques used to exploit software vulnerabilities. It good resource for anyone who wants to learn more about how to find and exploit vulnerabilities.
Covers advanced penetration testing techniques, including bug bounties. It good resource for anyone who wants to learn more about how to find and exploit vulnerabilities.
Provides guidance on how to manage information security risks. It good resource for anyone who wants to learn more about how to manage information security risks.
This comprehensive guide to Android security architecture and threat models provides an in-depth look at Android's security features and mitigations against malware, exploits, and vulnerabilities.
A practical guide to Android security testing, with hands-on exercises, code samples, and real-world attack scenarios.
A collection of practical recipes for implementing security features in Android applications, covering topics such as permissions management, encryption, and malware detection.
A comprehensive guide to Android security and ethical hacking, covering topics such as vulnerability assessment, malware analysis, and social engineering.
A comprehensive guide to Android forensics, covering topics such as data acquisition, analysis, and reporting.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser