1 00:00:08,320 --> 00:00:13,360 In the last lecture, we saw the difference between public program and private program. 2 00:00:14,640 --> 00:00:20,490 Now on the screen, you can see five steps to manage a hacker, one bug bounty program. 3 00:00:21,240 --> 00:00:24,150 The first one is to search for vulnerabilities. 4 00:00:25,040 --> 00:00:29,310 Hacker searches for vulnerabilities in the provided system or services. 5 00:00:29,900 --> 00:00:35,660 The next step is submitting whether it is reorganization in the form of a report. 6 00:00:36,760 --> 00:00:43,600 Third step is organization communicates back to bounty hunter if the final reports good. 7 00:00:45,130 --> 00:00:52,390 Fourth one is once they establish a relation between hacker and the company, the organization validates 8 00:00:52,390 --> 00:00:59,050 the submission and checks with the internal security team, whether disconsolately is existing or not. 9 00:01:00,300 --> 00:01:08,340 And the last one is if the vulnerability is existing and if it is a good of priority and if it is going 10 00:01:08,340 --> 00:01:15,240 to cost a great impact on the company, then the hacker will get rewarded with the reports of what is 11 00:01:15,240 --> 00:01:16,590 exactly hacker one. 12 00:01:18,100 --> 00:01:25,450 More than one lakh, 40000 security vulnerabilities and they are still counting have been eliminated 13 00:01:25,450 --> 00:01:27,940 with the help from hackers and hacker one. 14 00:01:28,970 --> 00:01:36,770 Hacker one is a bug bounty platform where various organizations host their bug bounty programs and hackers 15 00:01:36,770 --> 00:01:39,520 connect to organizations to this platform. 16 00:01:40,570 --> 00:01:47,230 So the HÃ¥kon platform acts as a bridge between the bug bounty hunters and the organizations. 17 00:01:48,680 --> 00:01:56,660 The hacker won top 10, most impactful and rewarded with two types is an interactive site allowing you 18 00:01:56,660 --> 00:01:58,750 to explore bounty hour levels. 19 00:01:59,000 --> 00:02:04,990 You can just go on the Internet and type one and it will get to the entire thing about hagwon. 20 00:02:06,160 --> 00:02:14,830 Hackenburg bounty program provides a managed donkey and bounty program with all the flexibility, expertise 21 00:02:14,950 --> 00:02:20,170 and resources needed to integrate back bounties into the security apparatus. 22 00:02:21,110 --> 00:02:28,460 Handguns experts who work with the organizations to design, manage and support your program from end 23 00:02:28,460 --> 00:02:35,050 to end, ensuring a smooth launch and seamless integration into your security efforts. 24 00:02:36,510 --> 00:02:43,410 For those new to bug bounty, this is a great entry point for those experience, it's a fast way to 25 00:02:43,410 --> 00:02:50,960 support the training payments, hacker rating report, tracking compliance and other considerations. 26 00:02:52,710 --> 00:02:58,860 Now, when the same internal teams are testing on applications for a long time, they lose the freshie 27 00:02:59,310 --> 00:03:05,940 and therefore hackers are used to find that spot, which is often missed by the internal security team. 28 00:03:07,510 --> 00:03:14,320 In the next lecture, I will be explaining why you will be hired by most of the organizations or why 29 00:03:14,320 --> 00:03:21,970 backboned important and why you should try going into this field now before moving ahead with the lecture. 30 00:03:22,000 --> 00:03:29,440 I would like to tell you that after learning this course, you will have a great knowledge of sound 31 00:03:29,440 --> 00:03:31,660 knowledge of bug bounty and ethical hacking. 32 00:03:32,200 --> 00:03:35,740 But that does not mean that only discourse is going to help you. 33 00:03:36,680 --> 00:03:41,940 We have an ethical hacking, computer networking and cybersecurity course as well. 34 00:03:42,470 --> 00:03:49,430 I recommend you to take those courses because more than 90000 students have enrolled in schools and 35 00:03:50,030 --> 00:03:56,660 a statistic Steam has been telling us that in the next couple of years we will be closing more than 36 00:03:56,660 --> 00:03:57,830 two black students. 37 00:03:58,400 --> 00:04:05,660 And that is why we have also been provided YouTube links to our videos, where we publish videos every 38 00:04:05,660 --> 00:04:12,830 week regarding the careers in cyber security, then ethical hacking, career path and various resources 39 00:04:12,830 --> 00:04:17,540 like e-books are also been provided in the resources section of this lecture. 40 00:04:18,200 --> 00:04:25,880 So whenever you complete a lecture, please do not forget to check the resources section as there might 41 00:04:25,880 --> 00:04:31,520 be an e-book available for you, which you have to read after completing the schools. 42 00:04:33,020 --> 00:04:40,100 And finally, I would like to end this lecture by saying that you have to constantly upgrade yourself 43 00:04:40,100 --> 00:04:42,010 each and every day, OK? 44 00:04:42,020 --> 00:04:44,960 You can't just rely on one single source. 45 00:04:44,960 --> 00:04:50,720 You have to read books, blogs, articles, keep practicing all the techniques that will be teaching 46 00:04:50,720 --> 00:04:52,190 you throughout this course. 47 00:04:52,790 --> 00:04:58,760 The next lecture is going to be the most important lecture for you and you will realize why bug bounty 48 00:04:58,760 --> 00:04:59,560 is important.