Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Finance
Data Analysis
Cybersecurity
Intelligenza Artificiale
Inglés básico: conversacional y networking
Inglés empresarial: ventas, gestión y liderazgo
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Hands-on workshop exploring Kubernetes vulnerabilities and prevention strategies. Demonstrates remote code execution exploit and teaches mitigation techniques for enhanced container security.
Explore Digital Forensics and Incident Response (DFIR) techniques for containerized applications, focusing on Kubernetes. Learn best practices for evidence collection and incident containment in modern cloud environments.
Explore open source security reviews, their importance, and differences from audits. Learn about TAG contributions to the upcoming Security guide and how to get involved in its development.
Explore Kubernetes primitives for secure microservices communication without service mesh. Learn about NetworkPolicy, token projection, API gateways, and more for authentication, encryption, and compliance.
Learn to refactor monolithic applications using Konveyor Data Gravity Insights, enhancing application performance and scalability in cloud-native environments.
Explore OpenCost for Kubernetes cost monitoring and learn optimization strategies for workloads, infrastructure, and operating systems to enhance cloud efficiency.
Discover proactive governance for cloud, cluster, and code with Cloud Custodian. Learn to manage resources efficiently and enhance security across your infrastructure.
Discover how to secure self-serve cloud infrastructure for Kubernetes teams using policy engines and cloud controllers. Learn to enforce compliance while enabling application teams to provision resources efficiently.
Priyanka Sharma delivers opening remarks, highlighting key developments and future directions in cloud native computing and CNCF-hosted projects.
Explore security risks in popular open-source projects and public registries. Learn about common misconfigurations, vulnerabilities, and best practices to safeguard your systems when using public resources.
Explore secure setups for private Sigstore instances, covering motivations, threat modeling, and operational requirements for enterprise artifact signing and verification.
Explore OSSF Scorecards to assess open source software health, automate risk evaluation, and build dependency policies for informed decision-making in software development.
Learn how Yahoo secures its software supply chain using open-source tools like Grafeas, Sigstore, and Kyverno. Discover strategies for source code scanning, vulnerability management, and protecting Kubernetes deployments at scale.
Explore how Northwestern Mutual enhanced cloud security through standardization, addressing the paradox of choice in development tools and patterns to improve efficiency and reduce vulnerabilities.
Explore secure deployment of self-hosted GitHub Actions runners using Kubernetes and actions-runner-controller. Learn about cluster settings, controller configurations, and runner pod security for regulated environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.