Bug Bounty Methodology and Hacking the US Government - Interview with Jack Cable

Bug Bounty Methodology and Hacking the US Government - Interview with Jack Cable

NahamSec via YouTube Direct link

How did you learn these different vulnerabilities

6 of 30

6 of 30

How did you learn these different vulnerabilities

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Bug Bounty Methodology and Hacking the US Government - Interview with Jack Cable

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Meet Jack Cable
  3. 3 How did it feel to find your first bug
  4. 4 Is hacking a scam
  5. 5 How did you hear about bug bounties
  6. 6 How did you learn these different vulnerabilities
  7. 7 Do you study cybersecurity in college
  8. 8 Has school affected your success
  9. 9 Do you have any certifications
  10. 10 Do you play any CTFs
  11. 11 How did your work with the government start
  12. 12 How did it feel to be an advisor on election security
  13. 13 Whats next for Jack
  14. 14 Hacking the government
  15. 15 Government Bounty Programs
  16. 16 Should the Government Pay for Critical Bugs
  17. 17 Tools for Bug Hunting
  18. 18 Asset Management
  19. 19 Criteria for Hacking
  20. 20 Collaboration
  21. 21 Mentors
  22. 22 Bug Bounty Resources
  23. 23 Imposter Syndrome
  24. 24 How to overcome imposter syndrome
  25. 25 How to overcome burnout
  26. 26 Jacks hobbies
  27. 27 Favorite books
  28. 28 Cybersecurity books
  29. 29 Advice for new hackers
  30. 30 Outro

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.