Information Security. Technical protection of confidential information - course 120,000 rubles. from IT Academy, training 512 hours, date December 13, 2023.
Miscellaneous / / November 30, 2023
IT Academy is a partner for customized project-based learning. Provides services for business development and transformation through the training of qualified personnel. Conducts large-scale educational projects, professional retraining, advanced training programs, courses in the most popular areas. Develops educational content based on customer needs.
The company builds educational ecosystems, and also introduces and develops e-learning technologies for personnel management. Thanks to a high level of expertise in distance learning solutions and content development for the corporate segment, IT Academy is a leader in IT and information security training - disciplines at the intersection of IT and business, as well as in training personnel for digital economy.
The range of services of the IT Academy is designed to meet the needs of any client, and the choice of courses, offered for advanced training and retraining will definitely satisfy the needs of any IT specialist.
Among the key areas of the IT Academy: Information security, Digital transformation, Authorized training from Russian vendors, EdTech solutions for corporate training, training of IT teams on staff customer.
IT Academy took 1st place among the best training centers in the quality rating of EdTech companies in the continuing education segment (SmartRanking).
IT Academy is part of the Softline Academy ecosystem, which combines two strong players in the corporate training market (IT Academy, Softline Training Center).
Candidate of Military Sciences, Associate Professor. Information security expert, certified instructor "Crypto-Pro", "Code-Security"
Higher education
2007 Northwestern State Correspondence Technical University, computers, complexes, systems and networks
2004 Naval Institute of Radioelectronics named after. A.S. Popov, automated control systems by fleet/computers, complexes, systems and networks
Specialty: engineer
Advanced training courses
2011 Huawei Enterprise Network Solution, Red Center
2010 CCNA-ICND2, FastLane, CCNA
2008 Red Hat Certified Engineer, Eureka, RHCE
Certification
Cisco Certified Instructor Expert (CCIE)
Certified Cisco Systems Instructor (CCSI)
Cisco Certified Service Provider (CCSP)
Cisco Certified Network Professional (CCNP)
Cisco Certified Network Associate (CCNA)
Cisco Certified Network Associate R&S (CCNA)
RedHat Certified Engineer, RHCE certificate
IBM PSeries, IBM, AIX 6.1 Administrator
HCSI
Total experience: 13 years
Teaching experience:
Teaching experience – more than 5 years.
Teaching and development of additional professional programs in the following areas of study:
- Cisco (CCIE R&S, CCNA Voice, CCSP, CCNP, CCNA Security, CCIE, etc.)
- Linux
-RedHat
- OS
Specializes in conducting courses in Cisco and Linux.
Works at IT Academy since 2013.
Clients:
Gazprom Inform LLC, RN-inform LLC, TB Inform LLC, Siberian Generating Company LLC, Well Repair Company Eurasia LLC, Rosenergoatom Concern OJSC Leningrad Nuclear Power Plant.
Additional Information:
Experience with equipment:
Cisco network equipment:
Routers and switches of various series
Call Manager, Call Manager Express - CCNA Voice level, actively studied
Security - ASA, Secure ACS, NAC
Network equipment from other manufacturers:
HP, H3C, Huawei, S-Terra
Dynamips/GNS3
Layer 3 routing and technologies: OSPF, EIGRP, RIP, HSRP, ACL, NAT
Second level technologies: VLAN, STP, VTP, Etherchannel, etc.
Network Security: ASA, NAC, L2 Security, VPN, AAA, CBAC
VOIP: CUCM, CUCME at CCNA Voice level. Some experience with Asterisk
Linux: Expert knowledge of various distributions. Configuring network services. HA Cluster, HPC Cluster.
IBM: PSeries, XSeries, DS4xx, DS5xx, SAN Switches, AIX, Linux
1. Organizational and legal basis of TZKI
2. Information processing tools and systems
3. Methods and means of TKI from leakage through technical channels
4. Measures and means of TZKI from NSD
5. Technical protection of confidential information from special influences
6. Organization of protection of confidential information at informatization facilities
7. Certification of informatization objects according to information security requirements
8. Monitoring the condition of TZKI