Introduction to the Git version control system - course RUB 12,500. from IBS Training Center, training 10 hours, Date January 22, 2024.
Miscellaneous / / December 03, 2023
Assessment and training of IT specialists in key areas of software development. Courses from expert practitioners in programming languages, system and business analysis, software architecture, manual and automated software testing, Big Data and machine learning, project management and Agile. There is a 10% discount on training for individuals.
I started my journey as an engineer on duty in a fault-tolerant enterprise (ferrous metallurgy, where downtime is possible within 1 year 0 minutes, the boiler cannot be cooled) studied the capabilities of the process control system and QNX real-time operating system 2000-2005 years.
As a chief engineer, he created an Internet provider with fiber to the home in a city with a population of over a million people in the Russian Federation, studied networks and used Cisco, *BSD, Linux in 2005-2010.
He honed his skills in automating the launch of various Unix systems AIX, Solaris, Redhat, VMWare, transferred applications to more than 200 virtual machines in AIX, prepared more than 200 Oracle databases for developers, DBA and production 24/7 in a geographically distributed cluster of 3 DCs in Moscow at the Russian Wholesale Electricity Exchange, used cfengine and shell scripts for automation, 2010-2016 years.
At HFT, he was successfully involved in the automation of all infrastructure resources: planetary VPN network, geographically distributed DCs, scalable distributed storage from 2 Pebibytes, optimization of operating systems for Low latency, creation of computing clusters from 10,000 vCPU 2016-2021.
We will teach you how to search for orders, bring together the customer and the contractor, receiving for this an average of 50% of the project cost.
In this course you will learn how to plan the processes of development, implementation and support of Internet projects, as well as how to effectively manage these processes.
The purpose of the course is to provide students with the knowledge and skills necessary to configure the security of an IT infrastructure. The course explains the importance of security settings and demonstrates protection measures. You will study a product that can protect virtual machines based on the three most popular hypervisors: VMware vSphere, Microsoft Hyper-V, Citrix XenServer.