📜 ⬆️ ⬇️

Courses of information technology from the company Yandex. Season 3 video

For some reason, Yandex did not declare in his blog on Habré that the video from the lectures of the third set of their CIT was uploaded to free access. Total 7 reports.

Under the cut plans for lectures.

Lecture 1. Professions in the world of information technology
Let's talk about the diversity of professions in the world of information technology.
Analysis of introductory tasks:

Professions by category:

Lecture 2. Tools of the system engineer
Overview of System Administrator Tools

Lecture 3. Operating system architecture
Let's talk about the architecture of the operating system on the example of Linux
Linux booting occurs in the following order:

The operating system provides a system call interface for application programs. This interface allows you to operate abstractions "file", "process", "socket", without being tied to the details of their implementation.

Lecture 4. Information Systems Security
At every level of the TCP / IP model, there are problems that can lead to a security breach — that is, confidentiality, integrity, or data availability. The causes of such problems are different: they may be design flaws, implementation errors, or simply incorrect configuration.

The lecture is an introduction to the practical world of information security. In it, we will consistently tell about the most typical (both retrospective and actual so far) vulnerabilities at the channel, network, transport and application levels, demonstrate how attackers exploit these vulnerabilities and how to protect themselves from this. As a bonus, at the end of the lecture, we will talk about the historical development of hacking and the history of computer system security from the 70s to the present day.
')
Lecture 5. Organization of data storage
Store billions of objects, just putting them in the database will not work. To do this, you need to use another class of solutions, which are usually called Big Data Storage.

It is necessary to take into account not only the total volume, but also the number of objects, network bandwidth, read speed and speed of access to data on disks. Separately, you need to take care of replication and data availability in case of failures. For each specific case, it is usually necessary to consider all existing options and look for a compromise between performance, usability and accessibility with the loss of individual nodes or entire replicas.

The report examines all of these aspects using the example of a hypothetical Instagram move from Amazon S3 to its own repository.

Lecture 6. Virtualization in Linux
Virtualization in modern information systems is used everywhere. Using it, you can simplify the solution of a whole class of tasks, but for this you need to understand the advantages, disadvantages and limitations of different virtualization technologies. In the report, we will talk about the existing types of virtualization, their features, as well as tools for managing virtual machines.

Lecture 7. Computer networks
Data exchange between two computers is not so simple as it seems at first glance. In the course of the lecture, we will follow the evolution of communication systems, find out how networks work within one geographically localized area, how far it can stretch, what to do if you need to combine far-away networks, and how to achieve this.

Lecture 7. Computer networks (continued)
In the course of this lecture, we will describe what mechanisms allow us to scale networks to the size of the Internet, consider dynamic routing protocols and the possibility of their application in a modern network.

Links to all courses:
  1. The first set (2011)
  2. The second set (2011)
  3. The third set (2012)

Source: https://habr.com/ru/post/161903/


All Articles