Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Language Learning
Web Development
Data Analysis
Marketing in a Digital World
Maintaining a Mindful Life
Product Management Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to reverse-engineer a privileged iOS server with Troy Bowman, a software engineer at Hex-Rays SA. This less than 1-hour material from Recon Conference provides insights into Apple's debugging tools.
Learn to exploit userland vulnerabilities on iOS11 with Recon Conference. Understand security enhancements, sandbox bypass strategies, and advanced exploit techniques in under 1 hour.
Learn about RetDec, an open-source machine-code decompiler developed by Avast, in less than an hour with Marek Milkovič and Peter Matula at the Recon Conference.
Learn to automate malware analysis using Binary Ninja in this less than 1-hour material by Erika Noerenberg, offered by Recon Conference. Ideal for analysts seeking time-saving techniques.
Learn to analyze and reverse engineer blockchain smart contracts on platforms like Ethereum, Neo, and EOS in under an hour with Patrick Ventuzelo at the Recon Conference.
Learn about firewall vulnerabilities in this less than 1-hour material from Recon Conference, presented by Rene Freingruber.
Learn to keep your tools safe with IDA in this under 1-hour material from Arnaud Diederen at the Recon Conference.
Explore USB-PD, ACPI EC, SMBus, SMC, and more with Alex Ionescu in this 1-2 hour material from Recon Conference. Dive into firmware, UEFI relationships, ACPI and AML interactions, and physical bus access.
Explore the basics of embedded devices and FreeRTOS architecture, security features, and reverse engineering in this under 1-hour offering from Recon Conference.
Explore Intel Processor Trace's design and usage in Windows environments for diagnostics and debugging, with a focus on guided fuzzing. Offered by Recon Conference, it takes less than an hour.
Explore Tesla's Bluetooth passive entry system's security with independent researcher Martin Herfurt in this 1-2 hour material from Recon Conference. Uncover potential attack vectors and core VCSEC protocol.
Learn to reverse engineer Golang with AlphaGolang, automate hunting and clustering, and generate code similarity rules in this under 1-hour offering from Recon Conference.
Explore contemporary code obfuscation schemes and the design of virtual machines in this under 1-hour talk by Recon Conference. Learn about weaknesses, modern deobfuscation techniques, and future trends.
Explore Unisoc baseband security research with Recon Conference. Learn to reverse-engineer and fuzz the NAS protocol in under an hour. Ideal for those interested in mobile platform security.
Learn to discover and exploit Linux kernel bugs, and use these methods for defense, in this short talk by Recon Conference. Gain valuable offensive security skills.
Get personalized course recommendations, track subjects and courses with reminders, and more.