Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Play by Play: Bug Bounties for Researchers

In this course, you’ll learn how bug bounty programs operate from the perspective of the researcher.

Troy Hunt - Pluralsight course - Play by Play: Bug Bounties for Researchers
by Troy Hunt

What you'll learn

In this course, Play by Play: Bug Bounties for Researchers, Troy Hunt and Casey Ellis discuss bug bounties from the perspective of the individual researcher. Learn how to get started, how to find opportunities, and see what the bug submission process can look like. By the end of this course, you’ll be able to speak to the benefits of participating in a bug bounty program and have a list of further resources to explore if you want to pursue bug bounties on your own.

Table of contents

About the author

Troy Hunt - Pluralsight course - Play by Play: Bug Bounties for Researchers
Troy Hunt

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.

More Courses by Troy