Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Marketing
Cybersecurity
Python
Comprendere la filosofia
Inglés empresarial: ventas, gestión y liderazgo
Greening the Economy: Sustainable Cities
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how modern iPhones keep wireless chips active even after power off, the implications for high-value targets, and how to analyze, debug, and install stealthy low-power malware. Offered by Recon Conference.
Explore the internals of Wslink's advanced VM obfuscator with Recon Conference's under-an-hour material. Learn semiautomatic deobfuscation techniques from malware analyst, Vladislav Hrčka.
Explore the history of Spectre-v2 exploits, learn about Branch History Injection attacks, and understand the latest defenses against them in this less than 1-hour session by Recon Conference.
Explore the intriguing world of error handling and reverse engineering in this short program by Recon Conference. Learn about exception journeys, stack unwinding, and binary analysis.
Explore the internals of the Wslink loader, linked to the Lazarus group, with Recon Conference. Learn advanced obfuscation techniques and a semiautomatic approach to deobfuscation in under an hour.
Learn about Samsara, a viral metamorphic engine for JVM, in less than an hour with Recon Conference. Understand its use in supply chain attacks and anti-debugging features.
Explore advanced persistent threat (APT) groups, their operation security, and their mistakes in this 1-2 hour material by Recon Conference. Gain insights into new attacker TTPs, business models, and defense strategies.
Dive into MikroTik firmware with Recon Conference's short program. Gain insights into RouterOS's unique protocols and release a new RouterOS remote jailbreak.
Explore the evolution of BlackMatter ransomware, its technical aspects, and its impact on the larger ransomware landscape in this less than 1-hour session by Recon Conference.
Learn about the security of industrial routers, specifically the Digi WR21 Wireless Router managed by Sarian OS, in this 1-2 hour material from Recon Conference.
Dive into a detailed dissection of QNX, a real-time operating system, with Recon Conference. Learn about exploit mitigations, secure random number generators, and memory management internals.
Explore the vulnerabilities of WSL (Windows Subsystem for Linux) in Windows 10 and learn to exploit them for privilege escalation. Offered by Recon Conference, this less than 1-hour material is a deep dive into modern Windows kernel security.
Dive into the intermediate language used in Hex-Rays Decompiler with this 1-2 hour material from Recon Conference. Gain programmatic access to powerful microcode.
Learn to automate and customize the process of reverse engineering C++ programs with Recon Conference's under 1-hour material. Discover the use of IDAPython and the Virtuailor framework.
Learn to detect vulnerabilities in iOS applications with Recon Conference's toolset. Understand downloading, decrypting, decompiling, static analysis, and result representation in under an hour.
Get personalized course recommendations, track subjects and courses with reminders, and more.