Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Enhance Kong Gateway's performance through optimization techniques, infrastructure tuning, and efficient data management. Learn about prometheus scraping, rate-limiting, and LMDB for improved efficiency.
Learn iterative threat modeling for agile development. Explore misconceptions, methodologies, and practical examples using OWASP Juice Shop. Discover effective ways to identify, prioritize, and mitigate security risks.
Fortify your codebase using GitHub's security features. Learn about Dependabot, advanced security tools, and best practices for enhancing developer experience and code protection.
Explore common misconfigurations, their risks, and effective strategies for securing configurations. Learn about permission management, data encryption, monitoring, and automation in DevSecOps.
Explore DevOpsSup, an extended DevOps approach integrating operations teams. Learn about building, management, and future prospects, with real-world project examples and key takeaways for implementation.
Explore honeytokens for detecting intruders, from their history to implementation options. Learn best practices and real-world examples to enhance your cybersecurity strategy.
Discover efficient secrets management in Kubernetes using GitOps, ArgoCD, and HashiCorp Vault. Learn to implement secure, scalable solutions for your applications.
Explore advanced software supply chain security strategies, focusing on risk assessment, contributor profiles, project dynamics, and integrating security into deployment pipelines.
Explore tactics and techniques of supply-chain attacks on Python open-source software, including starjacking, installation, delivery, and exfiltration. Learn defensive strategies against these threats.
Explore essential cybersecurity domains, from compliance to hacking, and understand their importance in developing comprehensive security strategies for modern organizations.
Explore TTP-based threat hunting with the Pandora Project. Learn about tailored defensive solutions, methodology workflows, and practical use cases for detecting known unknowns in cybersecurity.
Explore Kubernetes secrets management techniques, including GitOps, sealed secrets, external secrets, and Vault integration. Learn best practices for securing sensitive data in containerized environments.
Learn to identify and remove sensitive information from Git repositories, understanding risks and implementing effective defense strategies.
Explore hacking demos, asset intelligence, and XIoT vulnerabilities. Learn about common attack types, see live industrial device hacks, and discover remediation strategies for enhanced cybersecurity.
Enhance security in continuous delivery: Learn containerization challenges, vulnerabilities, misconfigurations, supply chain attacks, and IAM. Explore solutions and see a practical demo.
Get personalized course recommendations, track subjects and courses with reminders, and more.