Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Development
Marketing
Programming Languages
The Analytics Edge
Competitive Strategy
Learning How to Learn: Powerful mental tools to help you master tough subjects
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to reverse engineer Xiaomi's IoT ecosystem, access firmware, and implement new functions using the Nexmon framework in this less than 1-hour offering from Recon Conference.
Explore Intel Processor Trace's design and usage in Windows environments for diagnostics and debugging, with a focus on guided fuzzing. Offered by Recon Conference, it takes less than an hour.
Learn to reverse engineer a satellite-based IP content delivery system in less than an hour with Recon Conference. Gain insights into satellite reception, packet analysis, and more.
Dive into the intricacies of Windows Defender's JavaScript engine with this 1-2 hour material from Recon Conference. Learn reverse engineering, memory management, and exploit potential attack surfaces.
Learn to patch Broadcom Wi-Fi firmwares using Nexmon, a C-based framework, with this 1-2 hour material from Recon Conference. Ideal for dynamic analysis of proprietary firmwares.
Learn to subvert servers through BMC with HPE iLO4, covering firmware unpacking, vulnerability discovery, and exploitation techniques. Offered by Recon Conference.
Explore the tactics of the notorious espionage group, Turla, with ESET's malware researchers. Learn about their custom toolset used for breaching and spying. (1-2 hours)
Learn to emulate a buffer overflow in StarCraft 1.16.1 with a seasoned Win32 reverse engineer from Blizzard Entertainment. Explore reverse engineering techniques and tool development in 1-2 hours.
Learn about Cisco's SSL-based VPN, its vulnerabilities, and how to exploit them from an expert at NCC Group. Expect 1-2 hours of material. Offered by Recon Conference.
Learn to hack a 14-year-old Toshiba laptop and create a BIOS password recovery keygen in under an hour with Recon Conference. Led by experts from Dragon Sector CTF team.
Learn about the security of industrial routers, specifically the Digi WR21 Wireless Router managed by Sarian OS, in this 1-2 hour material from Recon Conference.
Explore the unseen dangers of bloatware in Dell and Lenovo machines in this less than 1-hour material from Recon Conference. Uncover security risks and critical vulnerabilities.
Explore mobile data security with Recon Conference's talk on Trusted Execution Environment (TEE). Learn about vulnerabilities, reverse engineering, and building a fuzzer for TrustZone apps.
Explore the security of hardware bitcoin wallets with Recon Conference's short program. Learn about electromagnetic fault injection attacks, countermeasures, and the use of PhyWhisperer tool.
Explore the world of gaming cheats and anti-cheats with Recon Conference's short program. Learn bypassing techniques, analyze market technologies, and use the AntiCheat-Testing-Framework tool.
Get personalized course recommendations, track subjects and courses with reminders, and more.