Courses from 1000+ universities
Class Central experiments with cataloging online courses from California Community Colleges, offering diverse, affordable, and credit-worthy learning opportunities.
600 Free Google Certifications
Python
Graphic Design
Computer Science
Songwriting: Writing the Lyrics
The Musculoskeletal System: The Science of Staying Active into Old Age
Digital Marketing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore confidential computing technologies, chains of trust, and attestation techniques for protecting data in use across various scenarios, including virtual machines, containers, and clusters.
Explore incident management strategies for small service teams, focusing on detection, tracking, fixing, and prevention. Learn key factors for successful handling and gain insights from Red Hat's CKI project.
Explore FIDO2/WebAuthn support for centrally managed users in LDAP servers, enabling passwordless and multi-factor authentication for console and POSIX system applications.
Explore how attackers exploit leaked secrets to breach organizations, analyzing recent incidents and discussing prevention strategies for this growing cybersecurity threat.
Discover how Kuttl simplifies local testing, reduces broken builds, and empowers developers to create accurate test environments, leading to faster and more efficient software releases.
Explore semgrep for static code analysis, learn to interpret results, create custom rules, and integrate it into CI/CD pipelines to enhance application security and catch vulnerabilities early.
Explora cómo los ataques a la cadena de suministro de software aprovechan las vulnerabilidades en componentes modernos y aprende estrategias para construir aplicaciones seguras en un entorno inseguro.
Explore the DevOps platform behind Ansible Lightspeed, an AI-powered service for generating Ansible content. Learn about automated pipelines, testing strategies, and tech stacks used to ensure high performance and reliability.
Explora la importancia y los desafÃos de los Inventarios de Software (SBoM), su relación con SPDX y su implementación en Fedora, todo explicado de manera accesible y sin jerga legal.
Explora las intersecciones entre polÃticas de cumplimiento gubernamental globales y cómo Red Hat simplifica la implementación de controles técnicos para la seguridad y el cumplimiento normativo.
Explore progressive delivery using Argo Rollouts, covering deployment strategies like blue/green and canary. Learn implementation techniques with OpenShift, GitOps, and Service Mesh.
Explore automation, standardization, and resiliency for managing services in customer-owned cloud environments using Package Operator, an open-source project for day-2 operations on Kubernetes.
Explore confidential computing setup, from machine configuration to running secure containerized workloads. Learn about architectures, image encryption, and security considerations for data protection.
Introducción a AI4CI: herramienta de AIOps abierta para optimizar tiempos de ejecución de pruebas largas en CI/CD mediante análisis de datos, visualización y modelos de ML para predecir puntos óptimos de detención.
Explore ethical hacking, vulnerability disclosure, and bug bounty programs. Learn to identify and report security flaws, analyze published reports, and potentially witness a live exploit demonstration.
Get personalized course recommendations, track subjects and courses with reminders, and more.