Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores ineffective password policies and presents a solution balancing security and usability. Discusses password history, attack models, human factors, and practical experiences with improved strategies.
Explore PMR, an open-source tool for efficient Linux system updates using procfs, systemd, and cgroups. Learn to minimize downtime and vulnerabilities during security patches.
Explore modern high-scale storage systems, comparing interfaces and features. Learn key factors for decision-making, evolutionary trends, and emerging technologies in data storage solutions.
Explore how DevOps can learn from aviation's operational systems to improve deployment frequency, safety, and efficiency in software development and organizational transformation.
Explore findings on security responsibilities in software development, discussing implications of IoT and open-source components in everyday devices and applications.
Methodology for debugging and tuning Apache Hadoop stack across layers, with insights on managing large-scale clusters efficiently. Best practices and tools for maintaining uptime, performance, and security.
Explore Project Atomic's approach to managing container hype, improving innovation, and enhancing control in the rapidly evolving landscape of virtualization and cloud technologies.
Insights into designing and operating large-scale cloud infrastructures, focusing on hardware architecture, efficiency, and TCO reduction for mega-scale public clouds like Microsoft Azure.
Explore JEA, a PowerShell toolkit for enhancing system security by granting admins limited privileges, addressing concerns raised by high-profile data breaches and corporate hacking incidents.
Exploring challenges and methods for secure cloud penetration testing, including targeted approaches using Docker instances and internal network interfaces for ethical hacking.
Insights on building effective anomaly detection algorithms for IT operations, covering common challenges, Gaussian techniques, and non-parametric methods for improved signal extraction from metric data.
Explore methodologies and pitfalls in storage system testing, covering negative, functional, and performance aspects. Learn tips and tricks developed from extensive vendor equipment testing experience.
Explore innovative approaches to organize and leverage metrics for enhanced data visualization, automated dashboards, and advanced fault detection in complex systems.
Explore Red Hat's integration of open source solutions for seamless enterprise identity management, covering SAML, Kerberos, LDAP, and more. Learn about scaling for cloud environments and best practices.
Overview of two IP visualization tools for displaying network addresses and traffic flow, created at Utah State University to enhance network monitoring and analysis capabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.