Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Communication Skills
Computer Networking
Astrobiology and the Search for Extraterrestrial Life
Introduction to Computer Science and Programming Using Python
Understanding Multiple Sclerosis (MS)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to reverse engineer Xiaomi's IoT ecosystem, access firmware, and implement new functions using the Nexmon framework in this less than 1-hour offering from Recon Conference.
Learn to repair Samsung ovens using power analysis & fault injection techniques in less than an hour with Recon Conference. Gain skills in reverse engineering, firmware recovery, and e-waste reduction.
Explore the security of low-earth satellites with Recon Conference. Learn to reverse engineer satellites, exploit vulnerabilities, and seize control, all in 1-2 hours.
Learn to exploit vulnerabilities in Phicomm routers with a tool developed by Recon Conference, gaining backdoor access to secure these unpatched devices.
Explore the use of old Windows APIs for cyber threats, with a focus on the PlugX malware variant. Offered by Recon Conference, this under-1-hour material delves into COM-based evasion techniques.
Explore the internals of Windows networking, uncover secrets through reverse engineering, and learn about recent vulnerabilities in this less than 1-hour session by Recon Conference.
Explore MS-DOS malware techniques to create art in this less than 1-hour talk by Nika Korchok at Recon Conference. Dive into bootkit history, reverse engineering, and modern adaptations.
Explore mobile data security with Recon Conference's talk on Trusted Execution Environment (TEE). Learn about vulnerabilities, reverse engineering, and building a fuzzer for TrustZone apps.
Explore the security of hardware bitcoin wallets with Recon Conference's short program. Learn about electromagnetic fault injection attacks, countermeasures, and the use of PhyWhisperer tool.
Explore the world of gaming cheats and anti-cheats with Recon Conference's short program. Learn bypassing techniques, analyze market technologies, and use the AntiCheat-Testing-Framework tool.
Explore Windows KASLR defeat, segment heap, and potential for LPE through ARW in this less than 1-hour material from Recon Conference.
Explore Qualcomm's Hexagon ADSP security analysis in this short, intensive session by Recon Conference. Learn about system architecture, debugging, and reverse engineering methodologies.
Learn to reverse engineer and exploit Broadcom Bluetooth chips with InternalBlue in this less than 1-hour material from Recon Conference.
Learn automated dynamic analysis techniques in C++ reverse engineering with DLL injection, offered by Recon Conference. Gain insights on inheritance and composition relationships.
Learn about executable containers, software build lifecycle, and application backdoors in this under 1-hour material from Recon Conference. Delve into the intricacies of ELF files and their components.
Get personalized course recommendations, track subjects and courses with reminders, and more.