Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore challenges and solutions for managing CI across diverse farms and devices, focusing on Mesa3D infrastructure and optimizing performance for large-scale projects.
Automate Java Application Server deployment and management using Ansible, from initial setup to full lifecycle control and repetitive task automation.
Explore Confidential Computing technologies, chains of trust, and attestation techniques for protecting data in use across various scenarios, from VMs to clusters.
Explore incident management strategies for small service teams, focusing on detection, tracking, fixing, and prevention using Red Hat's CKI project as a case study.
Explore FIDO2/WebAuthn authentication for centralized identity management in POSIX systems, enhancing security while maintaining strict access control for organizations.
Explore how attackers exploit leaked credentials to breach organizations and learn effective prevention strategies for safeguarding sensitive information.
Discover how Kuttl streamlines local testing, reduces broken builds, and empowers developers to match test environments accurately, enhancing CI efficiency and team productivity.
Explore semgrep for static code analysis, learn to interpret results, create custom rules, and integrate into CI/CD pipelines to enhance application security and catch vulnerabilities early.
Explore modern software vulnerabilities, recent supply chain attacks, and actionable steps to build secure applications in an insecure internet environment.
Explore the DevOps platform behind Ansible Lightspeed, an AI-powered service for generating Ansible content. Learn about automated pipelines, testing strategies, and tech stack decisions.
Explore Software Bill of Materials (SBoM), its importance, and implementation in Fedora. Learn about US government mandates, hidden pitfalls, and the SPDX migration.
Explore global security compliance frameworks and learn how Red Hat simplifies implementation of technical controls for government and organizational requirements.
Explore progressive delivery using Argo Rollouts, covering deployment strategies, OpenShift integration, and GitOps principles for modern software development.
Explore automation and resiliency for managing services in customer-owned cloud environments using Package Operator, an open-source project for Kubernetes day-2 operations.
Explore confidential computing technologies, from machine setup to running secure containerized workloads, covering architectures, workload preparation, and security considerations.
Get personalized course recommendations, track subjects and courses with reminders, and more.