Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
Introduction To Reverse Engineering Software
An Introduction to Cellular Security
Android Forensics & Security Testing
Introduction To Software Exploits
Introduction To Reverse Engineering Software (repeat)
Exploits 2: Exploitation in the Windows Environment
Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration
The Life of Binaries
Android Forensics & Security Testing (repeat)
Introduction to ARM
Rootkits: What they are, and how to find them
Flow Analysis & Network Hunting
Malware Dynamic Analysis
Pcap Analysis & Network Hunting
Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration (repeat)
Offensive, Defensive, and Forensic Techniques for Determining Web User Identity
Reverse Engineering Malware
Lessons-Learned in Designing a Training Course for Professionals
Introduction To Vulnerability Assessment