Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring Istio Ambient Mesh's sidecar-less architecture for enhanced security and simplified operations in service mesh adoption, featuring zero-trust tunnels and waypoint proxies.
Explore WebAssembly package distribution with warg, a new registry protocol offering enhanced supply chain security through Package Transparency, verifiable data structures, and easy detection of operator compromise.
Discover a security prioritization system for Kubernetes workloads based on the MITRE framework, helping differentiate real threats from potential ones in various contexts.
Discover OmniBOR, a revolutionary approach to capture artifact dependency graphs in software development, enhancing supply chain security and reducing false positives in vulnerability scanning.
Explore techniques for lateral movement from Kubernetes containers to cloud resources, covering RBAC misconfigurations, authentication methods, and real-world incidents. Learn prevention and detection strategies.
Learn to implement users and permissions in Kubernetes clusters, covering user provisioning methods, RBAC for fine-grained access control, and strategies for both managed and self-hosted environments.
Explore zero-trust principles for cloud-native environments, covering identity, policy, continuous assessment, and security. Learn implementation guidelines for protecting users, devices, networks, applications, and data.
Explore cloud-native security across the software lifecycle, from open-source creation to runtime threat detection. Learn about key projects, developer-security team collaboration, and separating real risks from myths.
Explore DevSecOps and Security as Code with CodeQL. Learn to implement security checks, detect vulnerabilities, and foster collaboration between development and security teams for a robust security culture.
Explore software supply chain security with insights on guidance, resources, and recent developments. Learn about the whitepaper, compromise catalog, and reference architecture for secure supply chains.
Explore Zero Trust principles in Kubernetes using SIFFE and Spire for workload identity-based authorization, eliminating the need for secrets and enhancing security across service meshes.
Explore advanced techniques for enhancing secure pod-to-pod communication in Kubernetes using trust bundles, leveraging cert-manager, SPIFFE, and KEP-3257 for automated TLS certificate creation and mTLS patterns.
Explore cryptojacking evolution in cloud environments, from basic attacks to sophisticated techniques targeting containers and Kubernetes. Learn proactive protection strategies using open-source tools for enhanced security.
Explore cloud native security fundamentals, attack vectors, and best practices for implementing continuous security in cloud applications without compromising innovation.
Explore OWASP's free tools for web application security testing and implementation. Learn to identify issues early and integrate security best practices throughout the software development lifecycle.
Get personalized course recommendations, track subjects and courses with reminders, and more.