Tallo logoTallo logo

Courses

Discover thousands of courses from top institutions and platforms worldwide

721 Courses Found

Sort by:
  • Newest First
  • Highest Rated
  • Most Reviewed
  • A to Z
  • Z to A
  • Price: Low to High
  • Price: High to Low
  • Duration: Short to Long
  • Duration: Long to Short
Bug Bounties - Relationship Advice for the Hunters and the Hunted course thumbnail
FREE

YouTube

Bug Bounties - Relationship Advice for the Hunters and the Hunted

44CON
Cybersecurity
Pricing Strategy

Explore the intricacies of bug bounty programs in this 54-minute conference talk presented by Katie Moussouris at the 44CON Information Security Conference. Gain insights into structuring effective bug bounty programs and maximizing their benefits for both organizations and hackers. Learn about making a business case for bug bounties, the importance of report quality, pricing strategies, and the impact of black markets. Discover how bug bounties are democratizing security research and their role in major tech companies like Microsoft and Google. Examine the challenges of national bug bounties, legal frameworks, and the future of vulnerability disclosure programs. Understand the delicate balance required to maintain successful relationships between bounty providers and security researchers in this comprehensive overview of the bug bounty ecosystem.

Bug Hunter Adventures course thumbnail
FREE

YouTube

Bug Hunter Adventures

nullcon
Cybersecurity
Storytelling

Embark on a thrilling journey into the world of bug hunting with this 30-minute conference talk from the Nullcon Security Conference. Discover the reconnaissance techniques and tools employed by experienced vulnerability researchers to uncover vulnerabilities in the prestigious Google Vulnerability Reward Program (VRP). Learn from Yuvraj Dighe and Shreyas Dighe as they share their captivating stories and insights, offering a unique perspective on the challenges and rewards of participating in one of the most sought-after bug bounty programs. Gain valuable knowledge about #GoogleVRP, #Bughunter strategies, #bugbounty techniques, and #Infosec practices that can help aspiring security researchers advance their skills and potentially break into this exciting field.

Bounty Hunters course thumbnail
FREE

YouTube

Bounty Hunters

GrrCon
Cybersecurity
Ethical Hacking

Explore the world of bug bounty hunting in this conference talk from GrrCon 2018. Dive into the strategies, techniques, and experiences of successful bounty hunters as they share insights on identifying and reporting vulnerabilities in software systems. Learn about the challenges and rewards of participating in bug bounty programs, and gain valuable tips for improving your own skills in this exciting field of cybersecurity.

Become a Successful Job Hunter course thumbnail

LinkedIn Learning

Certificate

Become a Successful Job Hunter

Career Development
Resume Writing
Professional Development

Maximize your job search efforts with expert advice from career coaches and business professionals. Whether you're a college graduate or student looking ahead, learn how to craft a career plan, write a resume, search for a job, and nail the interview. You'll also get a primer for professional life with courses on business acumen and how to start your job off right. Plan your career path.Discover and identify job opportunities.Learn the most effective interview techniques.

Bug Bounty Hunter Methodology V3 course thumbnail
FREE

YouTube

Bug Bounty Hunter Methodology V3

Bug Bounty
Ethical Hacking
Cybersecurity

Explore the latest techniques and strategies in bug bounty hunting with Jason Haddix's comprehensive talk on "Bug Bounty Hunter Methodology v3." Gain insights into effective approaches for identifying and reporting security vulnerabilities, and learn about the launch of Bugcrowd University. Access accompanying slides for visual reference, participate in the Q&A forum to engage with the speaker, and discover how to join the Bugcrowd community to apply your newfound knowledge in real-world bug bounty programs.

Offensive Bug Bounty - Hunter 2.0 course thumbnail

Udemy

Certificate

Offensive Bug Bounty - Hunter 2.0

Penetration Testing
Cybersecurity
Ethical Hacking

A Dynamic Hands-on Course on Bug Bounty Hunting What you'll learn: Bug Bounty huntingAndroid App Penetration TestingWeb Application Penetration TestingApplication Security Testing "Offensive Bug Bounty – Hunter 2.0" is an advanced course designed for those who have completed the foundational "Offensive Approach to Hunt Bugs." This sequel expands upon the initial training, diving deep into the complexities of identifying critical vulnerabilities in both web and mobile applications. As participants transition from the first course to this more specialized one, they are positioned to refine their techniques and emerge as adept stealth bug bounty hunters.Bug bounty hunting involves the identification of security vulnerabilities in websites and applications and responsibly disclosing these findings to the respective company's security team. This practice is known as ethical hacking because it helps organizations enhance their security measures before malicious attackers can exploit the vulnerabilities. Bug bounty programs, often referred to as responsible disclosure programs, are initiatives set up by companies to encourage individuals to report potential security issues. By participating in these programs, researchers can receive rewards such as monetary bounties, swag, or recognition in the company's hall-of-fame.For those with a keen interest in web application security, engaging in bug bounty hunting not only sharpens your skills but also offers the opportunity to gain recognition and earn rewards. This pursuit combines the thrill of discovery with the satisfaction of contributing to the enhancement of internet safety, making it a compelling and potentially lucrative endeavor for skilled cybersecurity enthusiasts.

Become a Successful Job Hunter course thumbnail

LinkedIn Learning

Certificate

Become a Successful Job Hunter

Career Development
Resume Writing
Personal Branding

Maximize your job search efforts with expert advice from career coaches and business professionals. Whether you're a college graduate or student looking ahead, learn how to craft a career plan, write a resume, search for a job, and nail the interview. You'll also get a primer for professional life with courses on business acumen and how to start your job off right. Plan your career path.Discover and identify job opportunities.Learn the most effective interview techniques.

Threat Hunting 101 - Become The Hunter course thumbnail
FREE

YouTube

Threat Hunting 101 - Become The Hunter

Hack In The Box Security Conference
Cybersecurity
Practical applications

Dive into the world of Threat Hunting with this informative conference talk from the Hack In The Box Security Conference. Learn about the evolution of Threat Hunting as a solution to outdated SOC models and discover what it takes to become an effective Threat Hunter in today's cybersecurity landscape. Explore essential skills, daily responsibilities, and techniques for hunting unknown threats, drawing insights from one of the industry's top Threat Hunting teams. Gain valuable knowledge through a technical case study showcasing real-world hunts and key stages of attack scenarios. Whether you're a seasoned security professional looking to leverage your existing skills or an enthusiast interested in pursuing a new career path, this presentation provides a comprehensive introduction to Threat Hunting concepts and practical preparation advice. Understand the growing demand for Threat Hunters and how you can contribute to this critical field. The talk balances abstract and technical content, making it accessible to a wide audience, and includes a special call for women passionate about security to consider this unique role.

Container Infrastructure Analysis with kube-hunter course thumbnail

Pluralsight

Certificate

Container Infrastructure Analysis with kube-hunter

Kubernetes
DevOps
Cyber Security

“Common” Kubernetes (K8s) hardening suggests a focus on the control plane. But what if a cluster could be backdoored through the kubelet? In this course, Container Infrastructure Analysis with kube-hunter, we will use kube-hunter to investigate a K8s attack. First, you will use kube-hunter to enumerate security weaknesses in a K8s cluster. Second, you’ll use kube-hunter findings (i.e., a discovered kubelet endpoint) to investigate privilege escalation. Third, you’ll leverage the privilege escalation findings to detect a persistence method (i.e., a malicious container image) through Trivy . Fourth, you’ll harden K8s so the aforementioned attack can’t occur again! When you’re finished with this course, you’ll have the skills and knowledge to detect these techniques: System Services (T1569), Exploitation for Privilege Escalation (T1068), and Implant Container Image (T1525).

Independent

Certificate

Bug Bounty Hunter Job Role Path

Bug Bounty
Ethical Hacking
Information Gathering

The Bug Bounty Hunter Job Role Path is for individuals who want to enter the world of Bug Bounty Hunting with little to no prior experience. This path covers core web application security assessment and bug bounty hunting concepts and provides a deep understanding of the attack tactics used during bug bounty hunting. Armed with the necessary theoretical background, multiple practical exercises, and a proven bug bounty hunting methodology, students will go through all bug bounty hunting stages, from reconnaissance and bug identification to exploitation, documentation, and communication to vendors/programs. Upon completing this job role path, you will have become proficient in the most common bug bounty hunting and attack techniques against web applications and be in the position of professionally reporting bugs to a vendor.

The Tales of a Bug Bounty Hunter course thumbnail
FREE

YouTube

The Tales of a Bug Bounty Hunter

Cybersecurity
Ethical Hacking
Bug Hunting

Explore the world of bug bounty hunting through a captivating conference talk delivered at BSides San Francisco 2016. Delve into the experiences and insights shared by Arne Swinnen as he recounts his journey as a bug bounty hunter. Gain valuable knowledge about the challenges, strategies, and rewards associated with identifying and reporting security vulnerabilities in various systems and applications. Learn from real-world examples and practical tips that can help aspiring bug bounty hunters improve their skills and increase their chances of success in this exciting field of cybersecurity.

Hunt Or Be Hunted course thumbnail
FREE

YouTube

Hunt Or Be Hunted

Security BSides
Data Analysis
Cybersecurity

Explore the evolution and practical application of threat hunting in cybersecurity through this Security BSides London conference talk. Delve into the distinction between traditional security monitoring and modern threat hunting techniques. Discover key datasets, analytical approaches, and cutting-edge Tactics, Techniques, and Procedures (TTPs) essential for effective threat hunting at scale. Learn about real-world compromises that evaded traditional detection methods but were uncovered through hands-on threat hunting. Gain insights into the Paris Model, manual vs. automated approaches, and the impact of events like the Shadow Brokers leak. Examine various data sources, analysis techniques, and tools used in threat hunting, including hashes, endpoints, network tools, and memory injection. Understand the role of frequency analysis, machine learning, and automation in enhancing threat detection capabilities. Acquire practical tips for implementing threat hunting, including a quick insider attack demonstration and the use of tools like Imhotep. Explore strategies for improving defense and detection methods, and gain perspective on the relationship between threat hunting and Red Team activities.

Trapped Ion Quantum Processors course thumbnail
FREE

YouTube

Trapped Ion Quantum Processors

Trapped Ions
Quantum Computing
Quantum Information

Explore the cutting-edge world of trapped ion quantum processors in this comprehensive lecture by Markus Hennrich from Stockholm University, Sweden. Delve into the fundamental principles, technological advancements, and potential applications of this promising quantum computing architecture. Gain insights into the challenges and opportunities in developing scalable trapped ion systems, and understand their role in the broader landscape of quantum information processing. Learn about recent experimental breakthroughs, quantum error correction techniques, and the future prospects of trapped ion platforms in realizing practical quantum computers.

The Hunger Gameplay Runthrough course thumbnail
FREE

YouTube

The Hunger Gameplay Runthrough

Board Games
Games
Game Mechanics

This course provides a gameplay runthrough of the board game "The Hunger." By watching the video, learners will understand the rules and mechanics of the game. The teaching method involves a video tutorial divided into two parts: Gameplay Runthrough and Final Thoughts. This course is intended for board game enthusiasts looking to learn how to play "The Hunger" or gain insights into its gameplay.

Meet The 'Planet Hunter' Searching For Alien Life course thumbnail
FREE

YouTube

Meet The 'Planet Hunter' Searching For Alien Life

Exoplanets
Astronomy
Astrophysics

Join University of Chicago astrophysicist Jacob Bean in this 34-minute talk as he discusses the scientific search for extraterrestrial life. Discover how Bean, part of the team that first detected carbon dioxide in an exoplanet's atmosphere using the James Webb Space Telescope, approaches this cosmic detective work. Explore how cutting-edge tools and recent discoveries are transforming our understanding of planet habitability and potential biosignatures. From promising candidates like K2-18b to disappointing cases like Gliese 486b, learn why studying the atmospheres of distant worlds may hold the answer to humanity's age-old question about our cosmic solitude.

Quantum Control for Trapped Ion course thumbnail
FREE

YouTube

Quantum Control for Trapped Ion

Quantum Information
Quantum Computing
Quantum Gates

Explore quantum control techniques for trapped ions in this 33-minute conference talk by Kenneth Brown from Duke University. Delve into the relationship between Hamiltonians and gates, and learn how gates are constructed from Hamiltonians. Examine the intricacies of controlling trapped ions, including specific operations used at Duke University. Investigate control errors and their mitigation through composite pulse sequences, with a focus on systematic errors like overrotation. Analyze the parity-controlled Z rotation experiment, comparing results to randomized compiling. Study the Mølmer-Sørensen gate and frequency-modulated gates, and discuss robust sequences for addressing noise beyond static conditions. Conclude by considering the limitations of these techniques due to power constraints.

Averting Extinction: Lessons from Borneo's Last Hunter-Gatherers course thumbnail
FREE

YouTube

Averting Extinction: Lessons from Borneo's Last Hunter-Gatherers

Anthropology
Genetic Analysis
Environmental Conservation

Explore the fascinating world of Borneo's last hunter-gatherers in this illuminating lecture from Stanford University's Steve Lansing at the Santa Fe Institute. Delve into the discovery of the Punan Batu, a nomadic group living in the rapidly diminishing forests of Borneo. Learn about their unique message stick communication system, which has enabled them to manage vast forest commons for generations. Examine how genetic analysis reveals the Punan Batu as Borneo's most ancient human population. Consider the implications of their lifestyle and communication methods for biodiversity conservation and commons management on a global scale. Reflect on the urgent need to preserve Borneo's forests and the potential for combining traditional knowledge with modern technology to revive the concept of shared natural resources. Gain insights into human history, anthropology, and environmental conservation through this compelling exploration of one of the last hunter-gatherer societies on Earth.

How I Made a Dragon Hunter in Blender course thumbnail
FREE

YouTube

How I Made a Dragon Hunter in Blender

Blender
3D Design
Visual Arts

Explore the process of creating a Dragon Hunter character in Blender through this 28-minute video tutorial. Learn about gathering references, modeling techniques, design updates, facial detailing, hair creation using Blender, and final rendering. Follow along as the artist demonstrates their workflow, from initial concept to finished artwork, including tips on using ArtStation for showcasing the final piece. Gain insights into character design and 3D modeling techniques while watching the step-by-step creation of this impressive Dragon Hunter character.

Burp Hacks for Bounty Hunters course thumbnail
FREE

YouTube

Burp Hacks for Bounty Hunters

Burp Suite
Ethical Hacking
Vulnerability Identification

Discover powerful Burp Suite techniques for bug bounty hunting in this 21-minute video presentation by James Kettle. Learn insider tips and tricks to enhance your web application security testing skills, optimize your workflow, and increase your chances of finding high-impact vulnerabilities. Gain valuable insights from an experienced security researcher as he shares his personal hacks and strategies for leveraging Burp Suite effectively in bug bounty programs.

Studying mammals: The insect hunters course thumbnail
FREE

OpenLearn

Certificate

Studying mammals: The insect hunters

Biology
Survival Strategies
Animal Adaptations

From pygmy shrews to armadillos, a wide range of mammals survive on a diet made up largely of insects. Many of these have fascinating adaptations suited to catching or rooting out their prey. In this free course, Studying mammals: The insect hunters, you will learn about these adaptations, along with survival strategies for when food is scarce. This is the second course in the Studying mammals series.