Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Fortify your codebase using GitHub's security features. Learn about Dependabot, advanced security tools, and best practices for enhancing developer experience and code protection.
Explore common misconfigurations, their risks, and effective strategies for securing configurations. Learn about permission management, data encryption, monitoring, and automation in DevSecOps.
Explore DevOpsSup, an extended DevOps approach integrating operations teams. Learn about building, management, and future prospects, with real-world project examples and key takeaways for implementation.
Explore honeytokens for detecting intruders, from their history to implementation options. Learn best practices and real-world examples to enhance your cybersecurity strategy.
Discover efficient secrets management in Kubernetes using GitOps, ArgoCD, and HashiCorp Vault. Learn to implement secure, scalable solutions for your applications.
Explore advanced software supply chain security strategies, focusing on risk assessment, contributor profiles, project dynamics, and integrating security into deployment pipelines.
Explore tactics and techniques of supply-chain attacks on Python open-source software, including starjacking, installation, delivery, and exfiltration. Learn defensive strategies against these threats.
Explore essential cybersecurity domains, from compliance to hacking, and understand their importance in developing comprehensive security strategies for modern organizations.
Explore TTP-based threat hunting with the Pandora Project. Learn about tailored defensive solutions, methodology workflows, and practical use cases for detecting known unknowns in cybersecurity.
Explore Kubernetes secrets management techniques, including GitOps, sealed secrets, external secrets, and Vault integration. Learn best practices for securing sensitive data in containerized environments.
Learn to identify and remove sensitive information from Git repositories, understanding risks and implementing effective defense strategies.
Explore hacking demos, asset intelligence, and XIoT vulnerabilities. Learn about common attack types, see live industrial device hacks, and discover remediation strategies for enhanced cybersecurity.
Enhance security in continuous delivery: Learn containerization challenges, vulnerabilities, misconfigurations, supply chain attacks, and IAM. Explore solutions and see a practical demo.
Explore supply chain attacks focusing on NPM, learn defensive strategies, and discover research findings on vulnerabilities in package ecosystems. Gain insights into detection tools and solutions.
Enhance memory skills for business success with techniques from a U.S. Memory Champion. Learn practical strategies to boost recall and improve professional performance.
Get personalized course recommendations, track subjects and courses with reminders, and more.