Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
An Oral History of Bug Bounty Programs
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 A bit about me
- 3 The Nature of Disclosure
- 4 Rain Forest Policy (RFPolicy)
- 5 The Trustworthy Computing Memo
- 6 Disclosure Drives Action
- 7 Remember Netscape?
- 8 Vendor Agnostic Bounty Programs
- 9 How vendor agnostic bounties work
- 10 Bug Bounty as a Service (BBaaS)
- 11 Evolving Marketplace
- 12 Exploit Intelligence Marketplace
- 13 Economy in Action
- 14 Lessons from Hacking Team Leak
- 15 How to Get Oday: Vulnerability Brokers
- 16 Bounty Programs Killing Exploits
- 17 Beyond Just Security Patches
- 18 Living in the Shadow Brokers Reality
- 19 Killing NSA's Tailored Access Operation exploits
- 20 Shades of Stuxnet
- 21 Killing CIA's Closed Network Infiltration Tool
- 22 Pwn2own Inspired Improvements
- 23 Benefits to Researchers
- 24 Conclusion