Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Finance
Psychology
Web Development
Python for Data Science
Mindfulness for Wellbeing and Peak Performance
Unlocking Information Security I: From Cryptography to Buffer Overflows
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore emergent load testing techniques to simulate real-world chaos in production systems. Learn to create adaptive scripts that autonomously evolve based on runtime feedback for more robust application testing.
Learn to build resource drivers for Dynamic Resource Allocation in Kubernetes, enabling advanced GPU management features like controlled sharing, multiple models per node, and dynamic MIG allocation.
Explore OpenTelemetry's semantic conventions for unified metadata across signals, enabling intelligent data processing and correlation. Learn about core conventions, extensibility, and real-world applications.
Explore Chaos Engineering principles and Chaos Mesh platform to improve system resilience. Learn to configure experiments, identify vulnerabilities, and enhance overall reliability through practical demonstrations.
Learn to enhance vulnerability management using OCI artifacts. Discover how to efficiently utilize SBOMs, signed attestations, and open-source tools for improved supply chain security at scale.
Explore Datadog's innovative approach to image signing and runtime verification, addressing software supply chain security challenges in complex, large-scale environments.
Explore korrel8, an open-source tool for correlating observability signals in Kubernetes, reducing cognitive load when debugging complex workload issues.
Explore Kubernetes' cloud provider framework, external cloud providers, and cloud controller manager. Learn implementation, responsibilities, and migration strategies for zero-downtime clusters.
Explore Longhorn, a cloud-native distributed block storage solution for Kubernetes. Learn its features, architecture, and recent developments through an introduction, deep dive, and interactive Q&A session.
Explore GPU scheduling in Kubernetes, including time sharing and Nvidia MIG, to optimize resource utilization for HEP and machine learning workloads. Benchmark results and management strategies included.
Explore security observability using eBPF and Cilium Tetragon. Learn to extract data, monitor activities, and detect container escapes for enhanced incident prevention and response.
Explore Kubernetes' new structured logging system, enhancing monitoring with machine-readable, contextual logs. Learn about klog improvements and their impact on the Kubernetes ecosystem.
Learn to enhance Kubernetes security using Gatekeeper and Ratify for supply chain policy enforcement. Explore admission controllers, CRD-based policies, and external data verification for robust cluster protection.
Explore the future of cloud native security, examining emerging technologies, architectural patterns, and potential challenges. Gain insights into next-gen security pipelines and industry advancements.
Explore automated incident response in cloud-native environments using Kubernetes and service mesh. Learn best practices, tools, and techniques for effective security management and threat mitigation.
Get personalized course recommendations, track subjects and courses with reminders, and more.