Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore rapid triage analysis using ANY.RUN for efficient malware assessment. Learn to gather crucial indicators of compromise and prioritize potential threats effectively.
Explore stack usage and stack frames in a debugger, tracing function calls to understand stack operations, calling conventions, and frame unwinding during program execution.
Perform basic triage analysis on ransomware binaries, compare obfuscated and unobfuscated versions, and learn to unpack using x64dbg and Scylla for effective malware analysis.
Explore PEB usage in malware, learn runtime DLL location techniques, and enhance IDA analysis with custom structures for improved reverse engineering.
Explore Lockbit's runtime linking techniques and API hash obfuscation. Learn to reverse engineer malware by understanding dynamic import table construction and decoding precomputed values.
Learn efficient techniques for identifying false positives and analyzing clean files in malware analysis. Gain actionable tips from real-world examples to enhance your workflow and save time and resources.
Explore PE file format essentials for malware analysis using tools like Detect-It-Easy, PEStudio, and Malcat. Learn to interpret tool outputs and understand file structure for effective triage analysis.
Explore popular online sandboxes for malware analysis, including AnyRun, Triage, and VirusTotal's behavioral output. Learn effective techniques for leveraging these tools in investigations.
Learn to analyze malicious network traffic using Suricata in REMnux. Explore alert generation, protocol dissection, file identification, and contextual flow information for effective threat detection.
Explore the AddressOfEntryPoint field in PE files, its relation to the main function, and techniques for locating it. Learn about PE file structure and entry point analysis.
Explore TLS callbacks in PE files, their use in malware, and detection methods. Learn to identify and analyze these anti-debugging techniques using various tools and Yara rules.
Learn to identify and extract digital signatures in PE files using the DATA_DIRECTORY structure, RVAs, and tools like Malcat for enhanced cybersecurity and malware analysis skills.
Explore Lockbit's runtime-linking technique, focusing on DLL name usage for API hashing seed creation and its impact on reverse engineering efforts.
Discover how relocations in PE files enable dynamic address adjustments, crucial for reverse engineers and malware analysts to understand how programs load at different memory locations and how ASLR affects execution.
Explore the basics of C++ name mangling through overloaded functions, understanding its benefits for namespace management, function overloading, and type safety in this introductory video.
Get personalized course recommendations, track subjects and courses with reminders, and more.