Completed
Chromium Bug Bounty
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Surviving the CVE Firehose: Strategies for Open Source Product Security
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What is a security vulnerability
- 3 The Venn diagram
- 4 What are security vulnerabilities
- 5 Is it secure
- 6 Is it compromised
- 7 Is it vulnerable
- 8 WordPress vulnerability
- 9 Traditional hacker
- 10 Money
- 11 Chromium Bug Bounty
- 12 How Much Do They Pay
- 13 What Is A CVE
- 14 The Silent Bug Fix
- 15 How Does This Help Me
- 16 Include An Update Mechanism
- 17 How To Track Vulnerabilities
- 18 Ikey Aikido Dirty
- 19 Attackable Surface Area
- 20 Privilege
- 21 Code Reviews
- 22 Should an outside company seek outside expertise
- 23 Are there plans to put CVE messages in kernel commits