Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how to secure self-serve cloud infrastructure for Kubernetes teams using policy engines and cloud controllers. Learn to enforce compliance while enabling application teams to provision resources efficiently.
Priyanka Sharma delivers opening remarks, highlighting key developments and future directions in cloud native computing and CNCF-hosted projects.
Explore security risks in popular open-source projects and public registries. Learn about common misconfigurations, vulnerabilities, and best practices to safeguard your systems when using public resources.
Explore secure setups for private Sigstore instances, covering motivations, threat modeling, and operational requirements for enterprise artifact signing and verification.
Explore OSSF Scorecards to assess open source software health, automate risk evaluation, and build dependency policies for informed decision-making in software development.
Learn how Yahoo secures its software supply chain using open-source tools like Grafeas, Sigstore, and Kyverno. Discover strategies for source code scanning, vulnerability management, and protecting Kubernetes deployments at scale.
Explore how Northwestern Mutual enhanced cloud security through standardization, addressing the paradox of choice in development tools and patterns to improve efficiency and reduce vulnerabilities.
Explore secure deployment of self-hosted GitHub Actions runners using Kubernetes and actions-runner-controller. Learn about cluster settings, controller configurations, and runner pod security for regulated environments.
Experts discuss how application security practices in cloud-native environments can reduce risks, enhance compliance, and drive innovation, leading to improved business value.
Explore Splunk's multi-cloud network security architecture, from VPCs to Istio, addressing scalability, agility, and security challenges across L3 to L7 layers.
Discover strategies to integrate cybersecurity into workplace culture, empowering employees to identify and address potential risks, fostering a safer digital environment for your organization.
Explore future threats to open-source software and supply chain security, discussing emerging attack vectors and strategies for OSS projects to prepare and protect against evolving risks.
Comprehensive guide to implementing Zero Trust Architecture using CNCF technologies, covering workload identities, security policies, DevSecOps, and organizational culture change.
Explore cryptographic agility for modern apps, focusing on quantum safety. Learn strategies for seamless transitions between cryptography standards and preparing for future cryptographic migrations.
Explore Zero Trust Architecture implementation using identity-based segmentation, focusing on cloud-to-premises communication through DMZs with identity-aware proxies and service mesh.
Get personalized course recommendations, track subjects and courses with reminders, and more.