1 00:00:08,940 --> 00:00:15,960 Now, before we begin to this lecture, I would like to tell you that we have put almost seven to eight 2 00:00:15,960 --> 00:00:22,470 months in creating this course, and we would like to hear your support and we would like to urge you 3 00:00:22,470 --> 00:00:27,380 to please support us by writing a review or just leave reading focus. 4 00:00:27,840 --> 00:00:33,840 If we do not know how to leave a rating for a cause, you just have to look at the right top corner 5 00:00:34,140 --> 00:00:35,400 where we have an option. 6 00:00:35,400 --> 00:00:36,480 Seeing, leveraging. 7 00:00:36,780 --> 00:00:43,260 You can just leave five styles of four stars, whatever you think, because we assure you that this 8 00:00:43,260 --> 00:00:46,710 is the best course for you if you want. 9 00:00:46,740 --> 00:00:50,910 You may write a review showing your experience towards our goals. 10 00:00:51,850 --> 00:00:59,050 So from Vesicular, I would like to request you to please leave reading, because your writings motivate 11 00:00:59,050 --> 00:01:00,740 us to create more causes. 12 00:01:01,240 --> 00:01:08,680 We have in our mind a certified ethical hacking course of almost 30 to 40 hours, which will complete 13 00:01:08,800 --> 00:01:11,540 the entire syllabus of S.H. exam. 14 00:01:12,280 --> 00:01:19,500 So if you want us to work as hard as we can, please motivate and support us by writing a nice review. 15 00:01:20,260 --> 00:01:26,230 We would really appreciate that it would just take around 30 seconds to liberate. 16 00:01:27,010 --> 00:01:29,350 So let us start with the goals. 17 00:01:31,840 --> 00:01:39,160 So what is bug bounty before moving into the definition of bug bounty, cause I would like to tell you 18 00:01:39,160 --> 00:01:41,380 the need of fixing vulnerabilities. 19 00:01:43,260 --> 00:01:51,210 Now, for the last several years, the most destructive data breaches have happened, 2019 was another 20 00:01:51,210 --> 00:01:58,320 year of numerous and highly damaging data breaches that put hundreds of millions of consumers at risk. 21 00:01:59,220 --> 00:02:01,200 But it could have been much worse. 22 00:02:01,890 --> 00:02:06,750 Tens of thousands of security vulnerabilities were eliminated with the help of hackers. 23 00:02:07,290 --> 00:02:10,570 Now, hackers are no longer anonymous guns for hire. 24 00:02:10,590 --> 00:02:17,610 We all know that everyone from the financial services industry to e-commerce giants to government agencies 25 00:02:17,880 --> 00:02:23,360 has embraced hackers as part of a mature, proactive security strategy. 26 00:02:24,680 --> 00:02:32,600 It is not hard to see why now businesses processes, more data and more personal data is being used 27 00:02:33,350 --> 00:02:40,130 as companies work overtime to push the code, criminals work overtime to find the vulnerabilities and 28 00:02:40,130 --> 00:02:41,720 exploit the organization's. 29 00:02:42,910 --> 00:02:49,780 As a bug bounty hunter, your job is to reduce the risk of a security incident, protect your brand 30 00:02:49,780 --> 00:02:54,680 and assets, and ensure the security of your customers and the valuable data. 31 00:02:55,750 --> 00:03:03,400 Now, keeping those assets secure is non-stock endeavor that requires highly technical and specialized 32 00:03:03,400 --> 00:03:04,050 skills. 33 00:03:05,690 --> 00:03:13,280 Now, according to Gardner, emerging technology analysis, bug bounty and crowdsourced security testing 34 00:03:13,280 --> 00:03:20,090 report says that bug bounty hunting is rapidly approaching critical masses throughout the globe. 35 00:03:21,080 --> 00:03:29,420 Over 74 million dollars in bounties have been awarded to various hackers for identifying more than one 36 00:03:29,420 --> 00:03:32,910 lakh 40000 security vulnerabilities. 37 00:03:33,360 --> 00:03:39,200 There's another huge number, and I would like to tell you that this number is increasing day by day. 38 00:03:40,220 --> 00:03:46,340 Each one of these vulnerabilities posed a real world risk to an organization combined. 39 00:03:46,340 --> 00:03:50,690 They represent a clear picture of the real world risks we face today. 40 00:03:52,070 --> 00:03:58,400 Now, in this cause, in this bug bounty codes, we will look at how organizations like Starbucks, 41 00:03:58,520 --> 00:04:06,940 LendingClub, GitHub hired that extra Deek, the help of bug bounty hunters in securing the organization. 42 00:04:07,310 --> 00:04:14,420 What will you learn in this cause is going to be very important and we have started right from the basic 43 00:04:14,420 --> 00:04:20,240 definition of bug bounty and then we further move on to ethical hacking concepts. 44 00:04:20,610 --> 00:04:23,990 I am very sure that you will truly enjoy this schools. 45 00:04:24,260 --> 00:04:29,980 And once again, I would like to request you that do not forget to leave a rating for course. 46 00:04:30,440 --> 00:04:30,950 Thank you. 47 00:04:31,220 --> 00:04:37,340 And we will see in the next lecture what is hacker power security.