Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Psychology
Marketing
Python
The Emergence of the Modern Middle East - Part I
Moralities of Everyday Life
Technical Report Writing for Engineers
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to reverse engineer Xiaomi's IoT ecosystem, access firmware, and implement new functions using the Nexmon framework in this less than 1-hour offering from Recon Conference.
Explore MS-DOS malware techniques to create art in this less than 1-hour talk by Nika Korchok at Recon Conference. Dive into bootkit history, reverse engineering, and modern adaptations.
Explore the architecture and potential threats of Windows Restart Manager with CrowdStrike's security researcher, Mathilde Venault, in this less than 1-hour Recon Conference session.
Explore Qualcomm Wifi chips' firmware modification with Recon Conference. Learn to extend functionality, find vulnerabilities, and understand the architecture in under an hour.
Learn to repair Samsung ovens using power analysis & fault injection techniques in less than an hour with Recon Conference. Gain skills in reverse engineering, firmware recovery, and e-waste reduction.
Explore the security of low-earth satellites with Recon Conference. Learn to reverse engineer satellites, exploit vulnerabilities, and seize control, all in 1-2 hours.
Learn to exploit vulnerabilities in Phicomm routers with a tool developed by Recon Conference, gaining backdoor access to secure these unpatched devices.
Explore the use of old Windows APIs for cyber threats, with a focus on the PlugX malware variant. Offered by Recon Conference, this under-1-hour material delves into COM-based evasion techniques.
Explore the internals of Windows networking, uncover secrets through reverse engineering, and learn about recent vulnerabilities in this less than 1-hour session by Recon Conference.
Learn efficient, architecture-agnostic heuristics for reverse engineering large binaries from Recon Conference. Gain insights into detecting intriguing code locations in under an hour.
Learn to build a robot for extracting RAM contents from embedded devices using low-cost hardware, with guidance from cybersecurity experts at the Recon Conference.
Learn to extract ROM from microcontrollers using photographic methods in a home lab, with guidance from reverse engineer Travis Goodspeed. Less than 1-hour workload. Offered by Recon Conference.
Explore the creation of a record/replay tool for macOS with Google engineers, delving into macOS-specific internals and challenges. Offered by Recon Conference.
Learn to exploit fully-remote baseband vulnerabilities in Samsung's 'Shannon' Exynos 5300 modem with Google Project Zero's Natalie Silvanovich. Less than 1-hour workload.
Learn to automate and customize the process of reverse engineering C++ programs with Recon Conference's under 1-hour material. Discover the use of IDAPython and the Virtuailor framework.
Get personalized course recommendations, track subjects and courses with reminders, and more.