Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Play by Play: Bug Bounties for Researchers

In this course, you’ll learn how bug bounty programs operate from the perspective of the researcher.

Troy Hunt - Pluralsight course - Play by Play: Bug Bounties for Researchers
Troy Hunt
What you'll learn

In this course, Play by Play: Bug Bounties for Researchers, Troy Hunt and Casey Ellis discuss bug bounties from the perspective of the individual researcher. Learn how to get started, how to find opportunities, and see what the bug submission process can look like. By the end of this course, you’ll be able to speak to the benefits of participating in a bug bounty program and have a list of further resources to explore if you want to pursue bug bounties on your own.

Table of contents

About the author
Troy Hunt - Pluralsight course - Play by Play: Bug Bounties for Researchers
Troy Hunt

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight