Courses from 1000+ universities
Class Central experiments with cataloging online courses from California Community Colleges, offering diverse, affordable, and credit-worthy learning opportunities.
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore eBPF-based tools for automatic generation of Kubernetes security policies, including network policies, seccomp profiles, and security contexts. Learn about limitations and future developments.
Explore how Northwestern Mutual enhanced cloud security through standardization, addressing the paradox of choice in development tools and patterns to improve efficiency and reduce vulnerabilities.
Experts discuss how application security practices in cloud-native environments can reduce risks, enhance compliance, and drive innovation, leading to improved business value.
Explore Splunk's multi-cloud network security architecture, from VPCs to Istio, addressing scalability, agility, and security challenges across L3 to L7 layers.
Exploring Istio Ambient Mesh's sidecar-less architecture for enhanced security and simplified operations in service mesh adoption, featuring zero-trust tunnels and waypoint proxies.
Discover a security prioritization system for Kubernetes workloads based on the MITRE framework, helping differentiate real threats from potential ones in various contexts.
Discover OmniBOR, a revolutionary approach to capture artifact dependency graphs in software development, enhancing supply chain security and reducing false positives in vulnerability scanning.
Explore cloud-native security across the software lifecycle, from open-source creation to runtime threat detection. Learn about key projects, developer-security team collaboration, and separating real risks from myths.
Explore DevSecOps and Security as Code with CodeQL. Learn to implement security checks, detect vulnerabilities, and foster collaboration between development and security teams for a robust security culture.
Explore software supply chain security with insights on guidance, resources, and recent developments. Learn about the whitepaper, compromise catalog, and reference architecture for secure supply chains.
Explore cloud native security fundamentals, attack vectors, and best practices for implementing continuous security in cloud applications without compromising innovation.
Explore OWASP's free tools for web application security testing and implementation. Learn to identify issues early and integrate security best practices throughout the software development lifecycle.
Hands-on workshop demonstrating lightweight threat modeling for CNCF projects, led by Andrew Martin. Learn practical techniques to identify and mitigate security risks in cloud-native environments.
Explore recent changes in cloud native networking solutions, comparing CNI and service mesh implementations for security policies, and understanding trade-offs between different approaches.
Explore distributed Hardware Security Modules for enhanced cloud security and performance. Learn how this solution balances remote and local HSMs, enabling secure cryptographic operations across cloud, on-premise, and edge environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.