We may earn an affiliate commission when you visit our partners.
CodeMash

CodeMash 2020 | Watch How The Giants Fall: Learning from Bug Bounty Results | John Melton

Read more

CodeMash 2020 | Watch How The Giants Fall: Learning from Bug Bounty Results | John Melton

This conference talk is a fun, fast-moving survey of some of the best recent bug bounty finds against some of the largest and best-known applications in the world. Some of the bugs are really simple, some are super complex, but all are entertaining. Throughout this talk, John Melton will share what caused the issue and how to fix it. You'll walk away with entertainment, a view of the wide breadth of security issues, and practical ideas on testing and shoring up security in your own applications.

Enroll now

What's inside

Syllabus

Watch How The Giants Fall: Learning from Bug Bounty Results

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Suitable for intermediate learners seeking to refine their skills in web application security and bug hunting
John Melton, a respected expert in cybersecurity, is the instructor for this course
Provides practical insights and real-world examples from the latest bug bounty findings
This course focuses on the analysis of security vulnerabilities in well-known applications, making it relevant to the industry
May be less suitable for beginners with limited knowledge of web application security
Requires technical background such as familiarity with C++, Python, and web server architecture

Save this course

Save Learning from Bug Bounty Results: CodeMash to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Learning from Bug Bounty Results: CodeMash. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Learning from Bug Bounty Results: CodeMash will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
In this role, you will ensure the confidentiality, integrity, and availability of an organization's information systems and data. You will need to have expertise in bug bounty hunting and security best practices, and this course will strengthen your knowledge of recent vulnerabilities in popular applications. You will learn how to identify and exploit these vulnerabilities so that you can better protect your systems from attack.
Penetration Tester
As a Penetration Tester, you will assess the security of computer systems, networks, and applications. You will use your knowledge of bug bounty hunting and security best practices to find vulnerabilities that could be exploited by attackers. This course will help you to improve your skills in identifying and exploiting vulnerabilities, and it will teach you how to write effective reports that can be used to fix those vulnerabilities.
Security Engineer
This role involves designing, implementing, and maintaining security measures for an organization's information systems and data. You will need to have a deep understanding of security best practices, and this course will help you to stay up-to-date on the latest vulnerabilities in popular applications. You will learn how to identify and fix these vulnerabilities so that you can better protect your systems from attack.
Software Developer
Software Developers design, develop, and maintain software applications. While not explicitly security-focused, a strong focus on security best practices can help prevent bugs from reaching production. This course will help you to understand the common vulnerabilities that are found in software applications, and it will teach you how to write more secure code.
Security Consultant
Security Consultants advise organizations on how to improve their security posture. You will need to have a deep understanding of security best practices and This course will help you to stay up-to-date on the latest vulnerabilities in popular applications. You will learn how to identify and fix these vulnerabilities so that you can better protect your clients' systems from attack.
Security Researcher
Security Researchers find and exploit vulnerabilities in software applications. This course will help you to improve your skills in identifying and exploiting vulnerabilities, and it will teach you how to write effective reports that can be used to fix those vulnerabilities.
Information Security Analyst
Information Security Analysts monitor an organization's security systems for suspicious activity. You will need to have a strong understanding of security best practices, and this course will help you to stay up-to-date on the latest vulnerabilities in popular applications. You will learn how to identify and fix these vulnerabilities so that you can better protect your organization's systems from attack.
Risk Analyst
Risk Analysts assess the risks to an organization's information systems and data. You will need to have a deep understanding of security best practices, and this course will help you to stay up-to-date on the latest vulnerabilities in popular applications. You will learn how to identify and fix these vulnerabilities so that you can better protect your organization from attack.
Security Manager
Security Managers oversee the security of an organization's information systems and data. You will need to have a deep understanding of security best practices, and this course will help you to stay up-to-date on the latest vulnerabilities in popular applications. You will learn how to identify and fix these vulnerabilities so that you can better protect your organization from attack.
Security Architect
Security Architects design and implement security measures for an organization's information systems and data. You will need to have a deep understanding of security best practices, and this course will help you to stay up-to-date on the latest vulnerabilities in popular applications. You will learn how to identify and fix these vulnerabilities so that you can better protect your organization from attack.
Chief Information Security Officer (CISO)
The CISO is responsible for the overall security of an organization's information systems and data. You will need to have a deep understanding of security best practices, and this course will help you to stay up-to-date on the latest vulnerabilities in popular applications. You will learn how to identify and fix these vulnerabilities so that you can better protect your organization from attack.
Bug Bounty Hunter
Bug Bounty Hunters find and exploit vulnerabilities in software applications and report them to the vendors for a reward. This course will help you to improve your skills in identifying and exploiting vulnerabilities, and it will teach you how to write effective reports that can be used to fix those vulnerabilities.
Forensic Analyst
Forensic Analysts investigate computer crimes and collect evidence from electronic devices. You will need to have a strong understanding of security best practices, and this course will help you to stay up-to-date on the latest vulnerabilities in popular applications. You will learn how to identify and fix these vulnerabilities so that you can better protect your organization from attack.
Incident Responder
Incident Responders handle security breaches and other security incidents. You will need to have a deep understanding of security best practices, and this course will help you to stay up-to-date on the latest vulnerabilities in popular applications. You will learn how to identify and fix these vulnerabilities so that you can better protect your organization from attack.
DevSecOps Engineer
DevSecOps Engineers integrate security into the software development process. You will need to have a deep understanding of security best practices, and this course will help you to stay up-to-date on the latest vulnerabilities in popular applications. You will learn how to identify and fix these vulnerabilities so that you can better protect your organization from attack.

Reading list

We haven't picked any books for this reading list yet.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser