Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Programming Languages
Data Analysis
Paleontology: Theropod Dinosaurs and the Origin of Birds
Preparing to Manage Human Resources
Transforming Digital Learning: Learning Design Meets Service Design
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from REcon Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn about Cisco's SSL-based VPN, its vulnerabilities, and how to exploit them from an expert at NCC Group. Expect 1-2 hours of material. Offered by Recon Conference.
Learn to hack a 14-year-old Toshiba laptop and create a BIOS password recovery keygen in under an hour with Recon Conference. Led by experts from Dragon Sector CTF team.
Learn about the security of industrial routers, specifically the Digi WR21 Wireless Router managed by Sarian OS, in this 1-2 hour material from Recon Conference.
Dive into a detailed dissection of QNX, a real-time operating system, with Recon Conference. Learn about exploit mitigations, secure random number generators, and memory management internals.
Explore the vulnerabilities of WSL (Windows Subsystem for Linux) in Windows 10 and learn to exploit them for privilege escalation. Offered by Recon Conference, this less than 1-hour material is a deep dive into modern Windows kernel security.
Dive into the intermediate language used in Hex-Rays Decompiler with this 1-2 hour material from Recon Conference. Gain programmatic access to powerful microcode.
Learn to automate and customize the process of reverse engineering C++ programs with Recon Conference's under 1-hour material. Discover the use of IDAPython and the Virtuailor framework.
Learn to detect vulnerabilities in iOS applications with Recon Conference's toolset. Understand downloading, decrypting, decompiling, static analysis, and result representation in under an hour.
Learn to bypass Code Read Protection in NXP LPC microcontrollers with this beginner-level, less than 1-hour material from Recon Conference. Includes hardware and software design.
Explore the security of cryptographic modules with Recon Conference's brief study on hacking and exploiting HSM firmware, led by a seasoned computer security researcher.
Learn to reverse engineer new CPU architectures using Python-based miasm2 and radare2 plugin r2m2 in this short, expert-led session from Recon Conference.
Learn advanced techniques for mapping between ActionScript 2/3 and their undocumented counterparts, moving from simple fuzzing to in-depth reverse engineering of Adobe Flash. Offered by Recon Conference.
Learn to use GRAP for malware detection by defining and matching graph patterns in binary code, with practical use cases and Python bindings. Offered by Recon Conference.
Explore the security implications of integrating open-source components into closed-source applications with this less than 1-hour material from Recon Conference. Learn from experts about auditing techniques, source-to-binary matching, and real-world app…
Learn to hack popular cryptocurrency hardware wallets with Thomas Roth & Dmitry Nedospasov in less than an hour, offered by Recon Conference.
Get personalized course recommendations, track subjects and courses with reminders, and more.