Play by Play: Bug Bounties for Researchers
by Troy Hunt and Casey Ellis
In this course, you’ll learn how bug bounty programs operate from the perspective of the researcher.
What you'll learn
In this course, Play by Play: Bug Bounties for Researchers, Troy Hunt and Casey Ellis discuss bug bounties from the perspective of the individual researcher. Learn how to get started, how to find opportunities, and see what the bug submission process can look like. By the end of this course, you’ll be able to speak to the benefits of participating in a bug bounty program and have a list of further resources to explore if you want to pursue bug bounties on your own.
About the authors
Troy Hunt is a Microsoft Regional Director and MVP for Developer Security, an ASPInsider, and a full time Author for Pluralsight—a leader in online training for technology and creative professionals. Troy has been building software for browsers since the very early days of the web and possesses an exceptional ability to distill complex subjects into relatable
explanations. This has led Troy to become an industry thought leader in the security space and produce more than twenty top-rated courses ... morefor Pluralsight. Currently, Troy is heavily involved in Have I been pwned? (HIBP) a free service that aggregates data breaches and helps people establish potential impacts from malicious web activity. Troy blogs regularly about web security and is a frequent speaker at industry
conferences across the globe and throughout the media to discuss a wide range of technologies. Troy has been featured in a number of articles with publications including Forbes, TIME magazine, Mashable, PCWorld, ZDNet and Yahoo! Tech. Aside from technology and security, Troy is an avid snowboarder, windsurfer and tennis player
Casey Ellis is founder, CTO, and chairman of the board of Bugcrowd. He started life in infosec as pentester, moved to the dark side of solutions architecture and sales, and finally landed as a career entrepreneur. He's been in the industry for 15 years, working with clients ranging from startups to government to multinationals, and awkwardly straddles the fence of the technical and business sides of information security. Casey pioneered the Bug Bounty as-a-Service model launching the first progr... moreams on Bugcrowd in 2012, and has presented at Blackhat, Defcon, Derbycon, SOURCE Boston, AISA National, and many others. He is happy as long as he's got a problem to solve, an opportunity to develop, a kick ass group of people to bring along for the ride, and free reign on t-shirt designs.