Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore critical vulnerabilities in OSS build pipelines, including 0-day discoveries in major projects. Learn about attack trees, mitigations, and 'Living Off the Pipeline' components for enhanced security.
Explore NYU's journey in software supply chain security, uncovering challenges, best practices, and a roadmap for enhancing software security.
Explore efforts to fix the libwebp vulnerability in Python packages, examining interactions between security standards and open source ecosystems.
Explore Skootrs, an open-source tool simplifying adoption of security practices for software developers through automation and guardrails.
Explore build provenance for Homebrew package manager, including achievements, challenges, and technical insights. Learn about its architecture and implications for similar ecosystems.
Explore the creation of Node.js Permission Model, uncovering motivations, challenges, and solutions. Gain insights into this experimental security feature and its impact on the ecosystem.
Enhance build pipeline security using OpenSSF projects: cosign, SBOMs, and SLSA. Demonstrate kpack for container image building on Kubernetes, integrating signed images and SBOM generation.
Explore strategies for managing open source software supply chains, focusing on collaboration between projects, foundations, consumers, and government to ensure security and efficiency.
Explore OpenSSF's public instances: hosting, scale, security, and usage guidelines. Gain insights into tools for safer software development and protection against attackers.
Explore OSTIF's 2022 security improvements to critical open source projects, funded by OpenSSF. Learn about the initiative's background and key outcomes.
Explore fuzzing techniques for Rekor, Sigstore's transparency log. Learn about challenges, artifact types, and results from months of testing. Gain insights on third-party security research approaches.
Explore 5 phases of DevOps pipeline security using open-source tools. Learn about code signing, repo scanning, image SBOMs, OCI registries, pipeline audits, and evidence catalogs to enhance cybersecurity.
Explore Sigstore's research opportunities in privacy-conscious transparency, stronger verification assurances, and distributed trust timestamping. Learn how to contribute to this open-source project.
Explore Japan's OSS security activities, SBOM adoption challenges, and potential certification uses in cloud services. Gain insights into unique industry perspectives and future preparedness.
Secure Kubernetes manifests throughout the software development lifecycle. Learn about integrity protection, signing techniques, and end-to-end supply chain security.
Get personalized course recommendations, track subjects and courses with reminders, and more.