Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Networking
Project Management
Modern & Contemporary American Poetry (“ModPo”)
Vital Signs: Understanding What the Body Is Telling Us
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the progress and challenges of Software Bill of Materials (SBOMs) implementation across industries with insights from a leading expert in dependable embedded systems.
Explore principles for enhancing package repository security, including a four-level maturity model. Learn about CISA's collaboration with OpenSSF to improve open source ecosystem security at scale.
Explore Lockheed Martin's integration of Sigstore for secure, auditable software development. Learn about internal Kubernetes deployments, certificate authorities, and streamlined GitLab pipelines for enhanced security.
Uncover complexities of dependency security, explore OSV project solutions, and learn strategies for integrating vulnerability management into developer workflows.
Explore compiler options to enhance C/C++ program security. Learn about memory-safety issues, mitigation techniques, and the OpenSSF Compiler Options Hardening Guide for informed decision-making.
Explore the Clean Dependency Project's proactive approach to OSS vulnerability management and learn how to contribute to this innovative open-source initiative.
Explore Sigstore's achievements, future roadmap, and vision for securing open source software. Learn about upcoming milestones and opportunities to contribute to this de-facto signing solution.
Discover best practices for FOSS projects to enhance security, from vulnerability prevention to effective response strategies. Learn to protect users through responsible security management.
Explore best practices for securing software repositories, focusing on EMEA-specific considerations and strategies to enhance code protection and integrity.
Explore secure open source software consumption practices and improve your software supply chain integrity with the S2C2F guide.
Explore IBM's approach to securing the software supply chain, focusing on key strategies and best practices for enhancing cybersecurity in development processes.
Explore transparent digital signatures with Sigstore to enhance software supply chain security and learn practical implementation strategies.
Explore open source software security principles and OpenSSF's best practices, including supply chain security and steps to address challenges.
Explore best practices for securing software repositories, focusing on strategies tailored for EMEA regions and addressing global cybersecurity challenges.
Explore strategies for securing software repositories, focusing on best practices and tools to protect against vulnerabilities and ensure code integrity.
Get personalized course recommendations, track subjects and courses with reminders, and more.