Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Finance
Data Analysis
Cybersecurity
Intelligenza Artificiale
Inglés básico: conversacional y networking
Inglés empresarial: ventas, gestión y liderazgo
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Experts discuss how application security practices in cloud-native environments can reduce risks, enhance compliance, and drive innovation, leading to improved business value.
Explore Splunk's multi-cloud network security architecture, from VPCs to Istio, addressing scalability, agility, and security challenges across L3 to L7 layers.
Discover strategies to integrate cybersecurity into workplace culture, empowering employees to identify and address potential risks, fostering a safer digital environment for your organization.
Explore future threats to open-source software and supply chain security, discussing emerging attack vectors and strategies for OSS projects to prepare and protect against evolving risks.
Comprehensive guide to implementing Zero Trust Architecture using CNCF technologies, covering workload identities, security policies, DevSecOps, and organizational culture change.
Explore cryptographic agility for modern apps, focusing on quantum safety. Learn strategies for seamless transitions between cryptography standards and preparing for future cryptographic migrations.
Explore Zero Trust Architecture implementation using identity-based segmentation, focusing on cloud-to-premises communication through DMZs with identity-aware proxies and service mesh.
Exploring Istio Ambient Mesh's sidecar-less architecture for enhanced security and simplified operations in service mesh adoption, featuring zero-trust tunnels and waypoint proxies.
Explore WebAssembly package distribution with warg, a new registry protocol offering enhanced supply chain security through Package Transparency, verifiable data structures, and easy detection of operator compromise.
Discover a security prioritization system for Kubernetes workloads based on the MITRE framework, helping differentiate real threats from potential ones in various contexts.
Discover OmniBOR, a revolutionary approach to capture artifact dependency graphs in software development, enhancing supply chain security and reducing false positives in vulnerability scanning.
Explore techniques for lateral movement from Kubernetes containers to cloud resources, covering RBAC misconfigurations, authentication methods, and real-world incidents. Learn prevention and detection strategies.
Learn to implement users and permissions in Kubernetes clusters, covering user provisioning methods, RBAC for fine-grained access control, and strategies for both managed and self-hosted environments.
Explore zero-trust principles for cloud-native environments, covering identity, policy, continuous assessment, and security. Learn implementation guidelines for protecting users, devices, networks, applications, and data.
Explore cloud-native security across the software lifecycle, from open-source creation to runtime threat detection. Learn about key projects, developer-security team collaboration, and separating real risks from myths.
Get personalized course recommendations, track subjects and courses with reminders, and more.