Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Web Development
Data Analysis
Computer Networking
Arab-Islamic History: From Tribes to Empires
Fundamentals of Reinforcement Learning
Songwriting: Writing the Lyrics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the basics of embedded devices and FreeRTOS architecture, security features, and reverse engineering in this under 1-hour offering from Recon Conference.
Learn simple cryptanalysis techniques with Francisco Blas Izquierdo Riera at the Recon Conference. No prior mathematical or cryptographic knowledge needed, but programming knowledge is recommended.
Learn to reverse-engineer Fitbit Flex firmware, modify it via binary patching, and wirelessly flash custom firmware, in under an hour with Recon Conference.
Learn to implement an AS3 based fuzzing tool and exploit UAF vulnerabilities using HashTable in Flash Player. Offered by Recon Conference, under 1 hour.
Learn to analyze embedded targets using static analysis and program analysis techniques with Recon Conference. Less than 1 hour of study.
Explore the landmark TRISIS/TRITON malware with Recon Conference. Gain insights into its impact on Industrial Control Systems through a blend of hardware and software reverse engineering.
Learn taint-based return oriented programming (T-Brop), an intermediate approach faster than symbolic tools and more expressive than syntactic tools, in under an hour with Recon Conference.
Learn to recover software architecture from large binaries using local function affinity in less than an hour with Recon Conference.
Learn to use Sandbagility, a Python-based framework for malware reverse engineering on Windows, in under an hour with Recon Conference.
Learn to develop a puzzle solver for reconstructing embedded Java firmwares from fragmented file systems in less than an hour with Phoebe Queen at Recon Conference.
Learn to audit Ethereum smart contracts using Rattle, an EVM binary analysis framework, in less than an hour with Recon Conference.
Learn to enhance Metasploit payloads and bypass Caller/EAF[+] checks with automation in less than an hour with Recon Conference.
Explore new vulnerabilities in SMM of Coreboot and UEFI systems with Recon Conference. Learn about their impact, mitigation techniques, and use the CHIPSEC framework for security assessment.
Explore legacy crypto protocols and DES cracking with David Hulton in this short, engaging session from Recon Conference. Ideal for security researchers.
Explore how modern iPhones keep wireless chips active even after power off, the implications for high-value targets, and how to analyze, debug, and install stealthy low-power malware. Offered by Recon Conference.
Get personalized course recommendations, track subjects and courses with reminders, and more.