Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Cybersecurity
Project Management
Digital Marketing
Python for Data Science
Perdón y reconciliación: cómo sanar heridas
Information Systems Auditing, Controls and Assurance
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from REcon Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore the security of popular VR games, understand the threat model, and learn about attack surfaces in this less than 1-hour material by Recon Conference.
Learn proactive defense and situational awareness in cybersecurity with Recon Conference's less than 1-hour material. Gain insights into attacker dynamics and enhance defensive capabilities.
Explore the unseen dangers of bloatware in Dell and Lenovo machines in this less than 1-hour material from Recon Conference. Uncover security risks and critical vulnerabilities.
Explore mobile data security with Recon Conference's talk on Trusted Execution Environment (TEE). Learn about vulnerabilities, reverse engineering, and building a fuzzer for TrustZone apps.
Explore the security of hardware bitcoin wallets with Recon Conference's short program. Learn about electromagnetic fault injection attacks, countermeasures, and the use of PhyWhisperer tool.
Explore the world of gaming cheats and anti-cheats with Recon Conference's short program. Learn bypassing techniques, analyze market technologies, and use the AntiCheat-Testing-Framework tool.
Explore Windows KASLR defeat, segment heap, and potential for LPE through ARW in this less than 1-hour material from Recon Conference.
Explore Qualcomm's Hexagon ADSP security analysis in this short, intensive session by Recon Conference. Learn about system architecture, debugging, and reverse engineering methodologies.
Learn to reverse engineer and exploit Broadcom Bluetooth chips with InternalBlue in this less than 1-hour material from Recon Conference.
Learn automated dynamic analysis techniques in C++ reverse engineering with DLL injection, offered by Recon Conference. Gain insights on inheritance and composition relationships.
Learn about executable containers, software build lifecycle, and application backdoors in this under 1-hour material from Recon Conference. Delve into the intricacies of ELF files and their components.
Learn to defeat APT10 compiler-level obfuscation with the modified IDA Pro plugin HexRaysDeob in under an hour with Recon Conference.
Dive into reversing complex Android malware SDK with Recon Conference's presentation. Uncover obfuscation layers, anti-analysis checks, and encrypted configurations in under an hour.
Learn about vectorized emulation and its applications in fuzzing and taint tracking in less than an hour with Brandon Falk at the Recon Conference.
Learn to find vulnerabilities in messaging and videoconferencing apps with Recon Conference's under 1-hour material, discussing encrypted protocols and lessons learned.
Get personalized course recommendations, track subjects and courses with reminders, and more.