Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Marketing
Programming Languages
Discover Dentistry
Exploring Play: The Importance of Play in Everyday Life
Mathematical Economics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to reverse engineer Xiaomi's IoT ecosystem, access firmware, and implement new functions using the Nexmon framework in this less than 1-hour offering from Recon Conference.
Learn to audit Ethereum smart contracts using Rattle, an EVM binary analysis framework, in less than an hour with Recon Conference.
Learn to enhance Metasploit payloads and bypass Caller/EAF[+] checks with automation in less than an hour with Recon Conference.
Explore new vulnerabilities in SMM of Coreboot and UEFI systems with Recon Conference. Learn about their impact, mitigation techniques, and use the CHIPSEC framework for security assessment.
Explore legacy crypto protocols and DES cracking with David Hulton in this short, engaging session from Recon Conference. Ideal for security researchers.
Explore how modern iPhones keep wireless chips active even after power off, the implications for high-value targets, and how to analyze, debug, and install stealthy low-power malware. Offered by Recon Conference.
Explore the internals of Wslink's advanced VM obfuscator with Recon Conference's under-an-hour material. Learn semiautomatic deobfuscation techniques from malware analyst, Vladislav Hrčka.
Explore the history of Spectre-v2 exploits, learn about Branch History Injection attacks, and understand the latest defenses against them in this less than 1-hour session by Recon Conference.
Explore the intriguing world of error handling and reverse engineering in this short program by Recon Conference. Learn about exception journeys, stack unwinding, and binary analysis.
Explore the internals of the Wslink loader, linked to the Lazarus group, with Recon Conference. Learn advanced obfuscation techniques and a semiautomatic approach to deobfuscation in under an hour.
Learn about Samsara, a viral metamorphic engine for JVM, in less than an hour with Recon Conference. Understand its use in supply chain attacks and anti-debugging features.
Explore advanced persistent threat (APT) groups, their operation security, and their mistakes in this 1-2 hour material by Recon Conference. Gain insights into new attacker TTPs, business models, and defense strategies.
Dive into MikroTik firmware with Recon Conference's short program. Gain insights into RouterOS's unique protocols and release a new RouterOS remote jailbreak.
Explore the evolution of BlackMatter ransomware, its technical aspects, and its impact on the larger ransomware landscape in this less than 1-hour session by Recon Conference.
Explore the vulnerabilities of Windows' Early Launch Antimalware (ELAM) in this under 1-hour talk by Recon Conference, featuring demos and in-depth analysis of potential security risks.
Get personalized course recommendations, track subjects and courses with reminders, and more.