Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
Data Analysis
Managing Conflicts on Projects with Cultural and Emotional Intelligence
Quantum Mechanics for Everyone
Mountains 101
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore key findings from the 2023 Kubernetes Benchmark Report, covering reliability, security, and efficiency in cloud-native environments.
Detect crypto-jacking in Kubernetes workloads using Falco. Learn to create rules, test environments, and implement security measures for cloud-native applications.
Explore WebAssembly and WasmCloud for enhanced cloud security. Learn about sandbox isolation, cryptographic signatures, and verifiable capability models to deploy secure, untrusted code with confidence.
Explore software supply chain security with experts discussing SBOMs, VEX, and their practical applications in Kubernetes environments, from open-source projects to regulated industries.
Learn to build a Kubernetes admission controller from scratch, exploring fundamentals, installation, and Python implementation. Gain hands-on experience in enhancing cluster security and policy enforcement.
Explore continuous, secure GitOps using Argo CD, Helm, and OPA. Learn to automate secure deployments, ensure compliance, and implement self-healing GitOps for Kubernetes clusters.
Explore JWT authentication, common pitfalls, and security best practices. Learn about JWT structure, verification, and protection against attacks like algorithm confusion and secret brute-forcing.
Explore the journey into Cloud-Native technologies, including Linux, containers, Kubernetes, and cluster security. Gain insights for newcomers, especially from underrepresented backgrounds in tech.
Explore keyless code signing without Fulcio, understanding its benefits and implementing it with existing PKI solutions like Vault and stepca for hassle-free, secure software signing.
Explore how Collins Aerospace develops a container factory to meet governance and compliance rules for safety-critical software, addressing challenges and integrating innovative solutions for cybersecurity and compliance.
Explore SLSA and GUAC tools to enhance container image security, verify build provenance, and understand artifact composition for safer deployments in production environments.
Discover strategies for fostering a company-wide security culture, educating non-security teams, and implementing a successful security advocates program to enhance organizational data protection and service availability.
Explore supply chain best practices and failures across industries to enhance software supply chain security. Gain insights from physical world processes and apply lessons to critical infrastructure protection.
Explore policy enforcement and governance in Kubernetes using OSCAL. Learn 12 key requirements for multi-cluster environments, focusing on security, compliance, and policy-as-code practices.
Explore secure software verification using TUF and Sigstore. Learn to design effective verification policies, understand signing limitations, and enhance security for open-source repositories and container registries.
Get personalized course recommendations, track subjects and courses with reminders, and more.