For some reason, Yandex did not declare in his blog on Habré that the video from the lectures of the
third set of their CIT was uploaded to free access. Total 7 reports.
Under the cut plans for lectures.
Lecture 1. Professions in the world of information technologyLet's talk about the diversity of professions in the world of information technology.
Analysis of introductory tasks:
- what is load average;
- C program with an array of the maximum possible size of KIT_MAX and errors;
- changeable and immutable computer identifiers, web servers with multiple processes and
- Linux and Windows threads
- already running process: tracing, debugging, profiling, dump, SystemTap.
Professions by category:
- software and network architecture;
- network and server administration;
- Information Security;
- corporate software: implementation and consulting;
- interface design;
- service and support;
- Database;
- web and software development;
- system analysis;
- project management.
Lecture 2. Tools of the system engineerOverview of System Administrator Tools
- communications: browser, email, jabber;
- documentation: wiki, memory cards, configuration management;
- work with equipment: anti-static bracelet, magnetic screwdrivers, console ports;
- command line: terminal, help, shell, text processing;
- access protocols: VPN, ssh -X, VNC, NX, x2go, x11vnc;
- text editor: vi, emacs, nano;
- programming languages: sh, perl, python, C / C ++;
- debugging and profiling: gdb, valgrind, perf, oprofile;
- package managers: rpm, dpkg, etc .;
- packet analyzers: tcpdump, wireshark, airodump-ng;
- backup: tar, rsync, amanda, bacula.
Lecture 3. Operating system architectureLet's talk about the architecture of the operating system on the example of Linux
Linux booting occurs in the following order:
- bootloader (usually grub2);
- core + initramfs image;
- mount the root file system;
- init (upstart, systemd) + scripts.
The operating system provides a system call interface for application programs. This interface allows you to operate abstractions "file", "process", "socket", without being tied to the details of their implementation.
Lecture 4. Information Systems SecurityAt every level of the TCP / IP model, there are problems that can lead to a security breach — that is, confidentiality, integrity, or data availability. The causes of such problems are different: they may be design flaws, implementation errors, or simply incorrect configuration.
The lecture is an introduction to the practical world of information security. In it, we will consistently tell about the most typical (both retrospective and actual so far) vulnerabilities at the channel, network, transport and application levels, demonstrate how attackers exploit these vulnerabilities and how to protect themselves from this. As a bonus, at the end of the lecture, we will talk about the historical development of hacking and the history of computer system security from the 70s to the present day.
')
Lecture 5. Organization of data storageStore billions of objects, just putting them in the database will not work. To do this, you need to use another class of solutions, which are usually called Big Data Storage.
It is necessary to take into account not only the total volume, but also the number of objects, network bandwidth, read speed and speed of access to data on disks. Separately, you need to take care of replication and data availability in case of failures. For each specific case, it is usually necessary to consider all existing options and look for a compromise between performance, usability and accessibility with the loss of individual nodes or entire replicas.
The report examines all of these aspects using the example of a hypothetical Instagram move from Amazon S3 to its own repository.
Lecture 6. Virtualization in LinuxVirtualization in modern information systems is used everywhere. Using it, you can simplify the solution of a whole class of tasks, but for this you need to understand the advantages, disadvantages and limitations of different virtualization technologies. In the report, we will talk about the existing types of virtualization, their features, as well as tools for managing virtual machines.
Lecture 7. Computer networksData exchange between two computers is not so simple as it seems at first glance. In the course of the lecture, we will follow the evolution of communication systems, find out how networks work within one geographically localized area, how far it can stretch, what to do if you need to combine far-away networks, and how to achieve this.
Lecture 7. Computer networks (continued)In the course of this lecture, we will describe what mechanisms allow us to scale networks to the size of the Internet, consider dynamic routing protocols and the possibility of their application in a modern network.
Links to all courses:
- The first set (2011)
- The second set (2011)
- The third set (2012)