Courses from 1000+ universities
Online learning can be more than content delivery. It can be where community happens.
600 Free Google Certifications
Finance
Psychology
Web Development
Python for Data Science
Mindfulness for Wellbeing and Peak Performance
Unlocking Information Security I: From Cryptography to Buffer Overflows
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore challenges in implementing Pod Security Admission, including handling privileged workloads and applying the principle of least privilege. Learn strategies for securing Kubernetes environments.
Explore Dailymotion's implementation of Apache Druid on Kubernetes for partner data management, covering architecture, challenges, and optimizations for scalability and performance.
Live demonstration of Kubernetes cluster attacks and defenses, exploring vulnerabilities, mitigation strategies, and practical security techniques for effective threat modeling and protection.
Explore the latest updates in Operator Framework, including OLM's new API and Operator SDK's v4 plugins. Witness a demo of OLM 1.0 featuring Deppy and Rukpak.
Explore the process of localizing Kubernetes documentation, including starting new projects, building language communities, and contributing to existing translations. Learn from experienced leaders in SIG Docs.
Explore sustainable cloud computing through carbon footprint tracking in multi-tenant services. Learn to combine CNCF projects for energy consumption estimation in storage systems, benefiting users and developers.
Explore Agones and Quilkin for scalable, secure multiplayer game server orchestration on Kubernetes. Learn about UDP service mesh, xDS API implementation, and simplified integration for enhanced game communication.
Explore Notary v2's advanced capabilities for securing software supply chains, including core functionalities, enterprise scenarios, and ecosystem integrations.
Explore Zero Trust principles and threat modeling for cloud-native systems. Learn to implement secure architectures using Istio, Kubernetes, SPIRE, and OPA for robust, distributed workload protection.
Insights into CNCF security audits: process, expectations, outcomes, and common vulnerabilities. Explores experiences from auditing six major projects and the value of audit reports for contributors and researchers.
Explore hyper-connectivity with NATS and Kubernetes, enabling seamless multi-cloud and edge solutions. Participate in a live demo showcasing powerful features like leaf nodes, gateways, and JetStream for scalable, state-based services.
Learn to enhance cloud security using OIDC tokens in CI/CD pipelines. Explore benefits, configuration, and integration with major platforms through practical demonstrations.
Explore lightweight Kubernetes for edge computing with K3s, and learn to manage containerized operating systems for efficient IoT device updates and maintenance in constrained environments.
Experts discuss service mesh architectures, comparing sidecar, sidecarless, and proxyless approaches. Explore design considerations, pros and cons, and future trends to help choose the right architecture for your organization.
Explore connectors in OpenTelemetry Collector for advanced data flow control. Learn to link pipelines, replicate data, and implement multi-signal logic for sophisticated observability signal processing.
Get personalized course recommendations, track subjects and courses with reminders, and more.