Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Information Technology
Software Development
Exploring English: Language and Culture
Marketing Digital: Content & Community Manager
Perdón y reconciliación: cómo sanar heridas
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the world of car infotainment systems and their vulnerabilities in this 1-2 hour material from Recon Conference. Learn from experts how to reverse engineer and infect these systems with SMS-commanded malware.
Explore the robust technique of binary instrumentation with experts from Technical University of Munich. Learn about its applications, challenges, and impact on security in under an hour.
Learn to clone a Casio 3208 calculator watch module and build your own sub-GHz radio hardware in less than an hour with Travis Goodspeed at the Recon Conference.
Learn to trace struct/object accesses in C/C++ applications using Struct Stalker, an LLDB script, in less than an hour with security consultant Jeff Dileo. Offered by Recon Conference.
Learn static instrumentation techniques based on executable file formats with Romain Thomas in less than an hour, offered by Recon Conference. Ideal for security researchers.
Learn to reverse-engineer a privileged iOS server with Troy Bowman, a software engineer at Hex-Rays SA. This less than 1-hour material from Recon Conference provides insights into Apple's debugging tools.
Learn to exploit userland vulnerabilities on iOS11 with Recon Conference. Understand security enhancements, sandbox bypass strategies, and advanced exploit techniques in under 1 hour.
Learn about RetDec, an open-source machine-code decompiler developed by Avast, in less than an hour with Marek Milkovič and Peter Matula at the Recon Conference.
Learn to automate malware analysis using Binary Ninja in this less than 1-hour material by Erika Noerenberg, offered by Recon Conference. Ideal for analysts seeking time-saving techniques.
Learn to analyze and reverse engineer blockchain smart contracts on platforms like Ethereum, Neo, and EOS in under an hour with Patrick Ventuzelo at the Recon Conference.
Explore the tactics of the notorious espionage group, Turla, with ESET's malware researchers. Learn about their custom toolset used for breaching and spying. (1-2 hours)
Learn to emulate a buffer overflow in StarCraft 1.16.1 with a seasoned Win32 reverse engineer from Blizzard Entertainment. Explore reverse engineering techniques and tool development in 1-2 hours.
Learn about Cisco's SSL-based VPN, its vulnerabilities, and how to exploit them from an expert at NCC Group. Expect 1-2 hours of material. Offered by Recon Conference.
Learn to hack a 14-year-old Toshiba laptop and create a BIOS password recovery keygen in under an hour with Recon Conference. Led by experts from Dragon Sector CTF team.
Learn about the security of industrial routers, specifically the Digi WR21 Wireless Router managed by Sarian OS, in this 1-2 hour material from Recon Conference.
Get personalized course recommendations, track subjects and courses with reminders, and more.