Special welcome gift. Get 30% off your first purchase with code “Buzz”. Find out more!

Cover image
User Avatar

Chen Shiri

0 Students
8 Courses

Chen Shiri is a cyber security researcher, hacker, known for his research on low-level security and isolation mechanisms, working with leading security firms, government organizations and Fortune 500 companies.

His research has revealed significant flaws within widely-used services and prominent vendors. He published research with early examples of weaknesses in microservices, container-based web apps and products.

  • This beginner-friendly course dives into the core security concepts behind Web3 and Ethereum smart contracts, empowering ethical hackers and curious developers with the skills to analyze, test, and secure decentralized...
    • 0 Lessons
    Free
  • This entry-level course introduces learners to the foundations of Android application security through hands-on labs and real-world scenarios. You’ll explore how Android apps work under the hood, how to decompile...
    • 0 Lessons
    Free
  • AI

    This advanced course is designed for cybersecurity professionals who want to integrate AI into offensive security workflows. From automating recon with language models to generating phishing payloads and exploring adversarial...
    • 0 Lessons
    Free
  • AI

    This course introduces cybersecurity professionals and ethical hackers to the emerging field of AI-driven red teaming. You’ll learn how modern AI models can be used for reconnaissance, phishing, malware generation,...
    • 0 Lessons
    Free
  • Cloud Instance Metadata Services (IMDS) are essential to cloud infrastructure — and a prime target for attackers. This entry-level course teaches ethical hackers and cloud security professionals how IMDS works...
    • 0 Lessons
    Free
  • This entry-level course equips ethical hackers and defenders with the knowledge to assess, exploit, and secure Kubernetes (K8s) environments.You’ll dive into the core components of Kubernetes — from pods to...
    • 0 Lessons
    Free
  • This hands-on course is designed for ethical hackers, red teamers, and cybersecurity professionals looking to master Docker and containerization for offensive and defensive use cases.You’ll learn how attackers leverage Docker...
    • 0 Lessons
    Free
  • IoT

    This foundational course introduces learners to the core technologies, platforms, and programming skills needed to build Internet of Things (IoT) systems — with an emphasis on secure development practices. From...
    • 0 Lessons
    Free
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.