Software architecture
Lack of reliability, complexity of support and updates, as well as speed and scalability are common problems of IT architectures. The courses in this section will provide students with basic knowledge and skills in software architecture design and analysis, as well as more in-depth study of individual topics.
Software development (general courses)
This section contains courses that will be useful to all developers, regardless of the development language used.
Software Safety
This section presents trainings on software security, including web applications. A special emphasis is placed on vulnerabilities, their impact on business, and ways to identify problems and bugs in the source code of an application.
- Artificial Intelligence in Cybersecurity: Opportunities, Risks, and Future Scenarios
Artificial intelligence has become a cornerstone in the ever-evolving battle against cyber threats. Security teams now rely on machine learning algorithms to sift through massive datasets far faster than any human could, spotting patterns that signal potential attacks. This shift started gaining real momentum around…
- Architecture of Modern Applications in 2026: What to Expect?
As we move through 2026, application architecture continues to evolve at a rapid pace, shaped by demands for resilience, speed, and sustainability. Developers now routinely build systems that can handle millions of concurrent users while maintaining sub-second response times. From enterprise platforms to consumer services…
- Why SSH-keys Are The Best Security Measure For Online Accounts
Passwords used to be enough. Now breaches spill credentials, attackers run credential-stuffing at scale, and phishing pages can fool even careful users. One reused password can unlock email, cloud storage, and payment resets. Rules like “make it longer” or “add a symbol” don’t change the…
- Common SSH Key Management Mistakes and How to Avoid Them
SSH keys make remote access quick; in parallel, they last a long time. That’s great until no one remembers who created a key, where the private half lives, or why a server still trusts it. In real environments – laptops, jump boxes, CI runners, and…