Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
Data Analysis
Managing Conflicts on Projects with Cultural and Emotional Intelligence
Quantum Mechanics for Everyone
Mountains 101
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore innovative uses of Software Bill of Materials (SBOMs) for secure asset transfer, dependency management, and cloud-native infrastructure deployments using CycloneDX and open-source tools.
Hands-on workshop demonstrating lightweight threat modeling for CNCF projects, led by Andrew Martin. Learn practical techniques to identify and mitigate security risks in cloud-native environments.
Explore recent changes in cloud native networking solutions, comparing CNI and service mesh implementations for security policies, and understanding trade-offs between different approaches.
Explore distributed Hardware Security Modules for enhanced cloud security and performance. Learn how this solution balances remote and local HSMs, enabling secure cryptographic operations across cloud, on-premise, and edge environments.
Explore how Parsec simplifies hardware-backed security and attestation for edge devices, enabling secure communication with cloud services across diverse ecosystems.
Analysis of 2,000 cloud detections reveals enterprise control patterns, gaps, and attacker motives. Learn to strengthen multi-cloud security operations with actionable insights and MITRE ATT&CK framework application.
Explore eBPF technology's power and security implications. Learn about auditing, monitoring, and enforcing eBPF program loading on Linux systems using Tetragon for enhanced system protection and accountability.
Analyze 7 real cloud security breaches, exploring attack methods, defense strategies, and specific takeaways to enhance cloud infrastructure protection and avoid similar vulnerabilities.
Explore secure cross-namespace communication in Kubernetes using ReferenceGrant. Learn how this resource ensures mutual agreement for safer interactions between namespaces in Gateway API.
Explore how to attach metadata like attestations, signatures, and SBOMs to OCI images without altering their immutable digest. Learn about standardization, implementation, and potential challenges.
Explore strategies for revoking access to Kubernetes clusters when administrators or users leave, addressing real-world security challenges and best practices for minimal disruption.
Explore strategies to integrate security seamlessly into DevOps, addressing challenges in CI/CD workflows and learning from real-world breaches to enable confident, secure deployments.
Overview of TAG Security's whitepapers and reference architectures for cloud native security, covering topics like supply chain security, zero knowledge, and security controls mapping.
Explore strategies for efficient container patching, including prevention, detection, fixing, and monitoring. Learn about opensource tools and best practices to streamline the process and meet security requirements.
Explore how open-source software enables secure, standardized Kubernetes-based platforms in regulated healthcare environments, focusing on efficiency, compliance, and cultural change.
Get personalized course recommendations, track subjects and courses with reminders, and more.