Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Web Development
Information Technology
Microsoft Excel
Bioseguridad y equipo de protección para la prevención de COVID-19
Songwriting: Writing the Lyrics
Introducción a la inversión bursátil
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to detect vulnerabilities in iOS applications with Recon Conference's toolset. Understand downloading, decrypting, decompiling, static analysis, and result representation in under an hour.
Learn to bypass Code Read Protection in NXP LPC microcontrollers with this beginner-level, less than 1-hour material from Recon Conference. Includes hardware and software design.
Explore the security of cryptographic modules with Recon Conference's brief study on hacking and exploiting HSM firmware, led by a seasoned computer security researcher.
Learn to reverse engineer new CPU architectures using Python-based miasm2 and radare2 plugin r2m2 in this short, expert-led session from Recon Conference.
Learn advanced techniques for mapping between ActionScript 2/3 and their undocumented counterparts, moving from simple fuzzing to in-depth reverse engineering of Adobe Flash. Offered by Recon Conference.
Learn to use GRAP for malware detection by defining and matching graph patterns in binary code, with practical use cases and Python bindings. Offered by Recon Conference.
Explore the security implications of integrating open-source components into closed-source applications with this less than 1-hour material from Recon Conference. Learn from experts about auditing techniques, source-to-binary matching, and real-world app…
Learn to hack popular cryptocurrency hardware wallets with Thomas Roth & Dmitry Nedospasov in less than an hour, offered by Recon Conference.
Learn to use WPP and TraceLogging Tracing for dynamic and static Windows in less than an hour with Recon Conference.
Learn X Ray Reverse Engineering in less than an hour with George Tarnovsky, offered by Recon Conference.
Explore the world of Baseband protocols, reverse engineering, and bug finding with Guy's talk at the Recon Conference. Less than 1-hour commitment.
Explore the security of popular VR games, understand the threat model, and learn about attack surfaces in this less than 1-hour material by Recon Conference.
Learn proactive defense and situational awareness in cybersecurity with Recon Conference's less than 1-hour material. Gain insights into attacker dynamics and enhance defensive capabilities.
Explore the unseen dangers of bloatware in Dell and Lenovo machines in this less than 1-hour material from Recon Conference. Uncover security risks and critical vulnerabilities.
Explore mobile data security with Recon Conference's talk on Trusted Execution Environment (TEE). Learn about vulnerabilities, reverse engineering, and building a fuzzer for TrustZone apps.
Get personalized course recommendations, track subjects and courses with reminders, and more.