Our courses

We offer a three-stage training program.

At the first stage, students of the course receive theoretical information about the subject. At the second stage, the student, together with the teacher, perform the practical tasks of the course. At the third stage, an independent examination takes place and a certificate confirming the qualifications of a specialist in the chosen field of knowledge is obtained.

Project management

Office management and archiving

(ADM-ARCH-101)

Training course: Advanced training in the field of archiving and office work This course gives an idea of ​​the modern requirements for storing documents in the organization’s archive, with the procedure and examination of the value of documents and selection for storage and destruction. Preparation of archive documents for processing, drawing up lists of cases, acts for the destruction of documents and cases with expired storage periods, archival references, extracts, and other accounting documentation. In the training program: • Analysis of local regulations on the documentary support of the organization's management; • Classification of information in accordance with the objectives of the organization's documentation; • Preparation of drafts of local regulations for the documentary support of the organization; • Conducting consultations on issues related to organizational and administrative documentation of the organization; • Legal, organizational and economic aspects; • Innovative approaches and modern applied scientific developments; • Compliance with the principles of labor protection and safety.

Educational Programs Methodist

(EDU-EPM-MET-101)

Training course: Methodist of educational programs. This course provides the necessary set of knowledge and skills necessary for those involved in the creation of educational products. The training course includes passing an exam in the form of testing in the following areas of knowledge: Competences of a methodologist, High-level design algorithms, Research, Structure of the educational program, Communication channels: offline and online, Algorithm of design from results, Learning technologies, Student motivation and motivational design of the program, Evaluation of students' activity and motivation, Development of practical tasks, Creation of tests, Design of educational materials, Assessment course quality. Persons who have attended the course and passed the exam receive the certificate “Certified Methodist of Educational Programs”.

Theory of disruptive innovations

(MGMT-INN-DISR-101)

Course: Disruptive Innovation Theory. This course aims to develop students' ability to innovate. The course provides a systematic approach to the conceptualization of innovation based on the route of technological evolution. It clearly defines disruptive technology and characterizes the distinctive aspects of disruptive strategy. This course provides specific examples of the disruptive innovation process to help you understand where disruptive technologies should be used and how to use these powerful innovation tools. Course content: Concepts and models, Features of disruptive technologies, Decomposition of a technical system, Discovery of disruptive technologies, Development of disruptive products

Using Agile Approach in Project Management. SCRUM Fundamentals as a Method of Agile Project Management

(PM-AGL-AGILE-101)

Agile methodology overview. Agile process overview. Life Cycle Models: Agile and Waterfall Compliance with project deadlines, budget and quality in the face of constantly changing requirements and unpredictable technical risks. Principles and Values of Agile Development Methodologies: Iterative and Incremental. The principles of forming a self-organizing team. People-oriented, cross-functional, teamwork. Implementation of frameworks Scrum, Kanban, Scrumban, etc. Planning and debriefing in scrum teams, responsibilities and duties.

Using Agile Approach in Project Management. SCRUM Fundamentals as a Method of Agile Project Management

(PM-AGL-AGILE-202)

Agile әдіснамасына шолу. Agile процесіне шолу. Өмірлік цикл модельдері: Agile және Waterfall Үнемі өзгеріп отыратын талаптар мен болжанбайтын техникалық тәуекелдер жағдайында жобаның мерзімдерін, бюджетін және сапасын сақтау. Дамудың икемді әдіснамасының принциптері мен құндылықтары: Итеративтілік және өсу. Қалыптастыру принциптері самоорганизующейся команда қатысты. Адамдарға бағдарлау, кросс-функция, топтық жұмыс. Scrum, Kanban, Scrumban және т. б. жақтауларын енгізу. Scrum командаларында жоспарлау және қорытындылау, жауапкершілік және міндеттер.

Scrum Master

(PM-SM-SCRUM-101)

A course for beginner Scrum Masters (0 to 3 months of experience in this role). Upon completion of the course, you will be able to effectively build a process for one Scrum team and learn how to solve team problems.

Training of Trainers: managerial competencies, HR, soft skills

(TOT-CBT-MNGT-202)

Training course: Training of trainers: managerial competencies, HR, soft skills. Training of certified business trainers (teachers, lecturers) to conduct training in the areas of strategic management, people management, soft skills. The training program includes: * creation of transformational training that helps to master new skills * transfer of material through a coaching approach or how to help a participant use a new skill tomorrow * how to work with objections and resistances in a group in an eco-friendly way * how to use interaction with participants as a resource for the entire training * voice and gesture control * management of the coaching space and the participants' space * energy management * setting up a logical connection between the training material and the participants' life experience * students' mastering of managerial skills, personnel management skills and “soft” skills (soft skills) Persons who have attended the course and passed the exam receive the certificate "Certified Business Trainer: managerial competencies, HR, soft skills.

Software Applications

Electronic document management systems

(APP-EDOC-101)

Training course: Electronic document management systems. The concept of electronic document management. Automated electronic document management systems. Operation of electronic document management platforms using cloud technologies. Operation of electronic document management platforms using our own / leased physical infrastructure. The concept of security, availability, load and fault tolerance of information systems. The concept of cloud computing platforms and data centers, the concept of acquisition and operation models of information systems Infrastructure as a service (IaaS), Platform as a service (PaaS), Software as a service (SaaS), Software as a product (On-Premise). Comparison of EDMS Ownership Models - Capital Costs and Operating Costs (CapEx vs OpEx) The concept of proprietary and free open source software. Vendor lock. The concept of the complexity of technologies for the development and operation of EDMS. Problems of transition from paper to electronic document management. Comparison of approaches to the development and operation of EDMS. Purchase of ready-made software. EDMS rental according to the service model. Advantages and disadvantages. The main purpose and areas of use of the EDMS. Essence, structure and functions of electronic document management systems. Functions and tasks solved by the EDMS (search, routing, access control, logging, categorization, nomenclature, archiving, etc.). The main classes of EDMS. Corporate content management systems (CMS). Imaging systems. Business Process Oriented Systems. Workflow management systems. The main structural elements of the EDMS (storage of documents and cards, business logic modules, electronic digital signature). Kazakhstani and foreign approach to document management. Specificity of document flow in the Republic of Kazakhstan. Ensuring the legal significance of electronic documents. EDMS groups in the Kazakhstan market (open source platforms, proprietary Kazakhstani developments, proprietary foreign software platforms). The advantages and disadvantages of the main representatives of these groups. The process of selecting an ERMS for an organization. Criterias of choice. Technologies for comparative analysis of EDMS. Methods for surveying the enterprise and determining the functional requirements for the EDMS. Calculation of the total cost of ownership of the EDMS. EDMS implementation technologies. Features of the implementation of document management systems. Stages of EDMS implementation. Cost and duration of the implementation process. Costs and effects of the implementation of the EDMS in the organization. Persons who have attended the course and passed the exam receive a certificate “Certified Specialist of Electronic Document Management Systems on Cloud Computing Platforms.

Integrated school digitalization systems

(APP-SCHL-EMKTP-101)

Training course: Integrated School Digitalization System E-Mektep. This course provides the necessary set of knowledge and skills necessary for the installation, configuration, maintenance, administration, technical support and use of the software of the integrated automated digitalization system of schools E-Mektep. In order to confirm the readiness of a specialist, the training course includes passing an exam in the form of testing in the following areas of knowledge: - Review of the automated digitalization system of E-Mektep schools. The architecture of the E-Mektep system. - Planning the deployment of the E-Mektep system. Calculation of equipment requirements. Requirements for operating systems, DBMS and applications. - E-Mektep administration tools. Using a single administrator console with the ability to restrict access. Organization of data storage in DBMS and file storage. Log of actions of system administrators. - Configuration of the security system equipment. Operational management of ACS devices. Maintaining a list of users (employees, students, etc.). Assignment of access rights. Access control to the premises. - Accounting and control of the use of the library fund. Accounting and control of visits to the canteen by individual categories of users. - Notifications via messengers. Reporting system. - Backup and restore data. Application of backup and recovery tools. Special recovery situations. - Ensuring fault tolerance of the system. Fault-tolerant clusters. Other means of ensuring fault tolerance. - Monitoring of the system operation and diagnostics of problems. Common situations in the system and solutions. Persons who have attended the course and passed the exam receive a certificate “Certified specialist in the installation, configuration and maintenance of the software of the automated E-Mektep system".

Using Alfresco Content Management Systems

(FOSS-APP-ECM-ALFR-101)

Training Course: Using Alfresco Content Management Systems. This course provides the necessary set of knowledge and skills required to install, configure, administer, support and use the Alfresco Content Management System. In order to confirm the readiness of an Alfresco content management systems specialist, the training course includes passing an exam in the form of testing in the following areas of knowledge: - Overview of the Alfresco workflow system. Alfresco architecture. Comparison with competing document management systems. Advantages and disadvantages of the Alfresco document management system. - Planning the deployment of the Alfresco system. Calculation of hardware requirements. Requirements for operating systems, DBMS and applications. Alfresco deployment process. - Alfresco Administration Tools. JMX, MC4J, JManage. Command line utilities for Alfresco administration. Alfresco configuration files. - Alfresco repository configuration. Organization of content storage. Alfresco virtual file system. - Setting up authentication. Alfresco authentication chains. Configuring the Active Directory / NTLM authentication chain. Configuring LDAP and Kerberos authentication chains. The use of external means of authentication. - Creation of document libraries. Supported file formats. File version control. Business process history for documents. - Alfresco Collaboration Sites. Organization of teamwork. Site components. Access rights and management of site members. - Additional custom Alfresco capabilities. Working with discussions, business processes, calendars. Description of documents. User mailbox. - Organization of full-text search in Alfresco. Creation of indexes. Application of Solr platform for binary data search in Alfresco (files DOCX, XLSX, PDF and others). - Alfresco data backup and restore. Applying built-in backup and recovery tools. An overview of third-party Alfresco backup and recovery tools. Special recovery situations. - Ensuring fault tolerance of the document management system based on Alfresco. Alfresco Failover Clusters. Other means of providing fault tolerance. - Monitoring of Alfresco's work and diagnostics of problems. Common situations in Alfresco's work and solutions. Persons who have attended the course and passed the exam receive a certificate “Certified Specialist of Alfresco Content Management Systems”.

Systems architecture

Business Analysis Fundamentals

(BA-BAF-BA-101)

Training course: Fundamentals of business analysis. This course provides the necessary set of knowledge and skills necessary to understand the basics of business analysis. In order to confirm the readiness of an expert, the training course includes passing an exam in the form of testing in the following areas of knowledge: Definition of Business Analysis, The role and tasks of business analysis, The value of business analysis in carrying out changes in the organization, Key concepts of business analysis; Planning and Monitoring, Information Gathering and Collaboration, Requirements Lifecycle Management, Requirements Analysis and Prototyping, Solution Evaluation, Business Analysis in Project Management Methodologies, Business Analysis in Projects, Role of Business Analyst in Projects, Application of Business Analysis Results, Key Business Analysis Practices, An Overview of the Application of Basic Business Analysis Practices; Modeling of business processes, requirements for competencies in business analysis; Competence model in business analysis. Issues of automating business analysis; Business Intelligence Tools, Automated Collaboration Overview. Persons who have attended the course and passed the exam receive a certificate of attendance for the course "Fundamentals in Business Analysis".

Information systems architecture

(FOSS-SYS-ARCH-SFT-101)

Training course: Information systems architecture. This course provides the necessary set of knowledge and skills required to manage information systems architecture. In order to confirm the readiness of an information systems architect, the training course includes passing an exam in the form of testing in the following areas of knowledge: - The concept of information systems architecture, enterprise architecture in the context of international standards. - The main tasks solved by an information systems architect, an enterprise architect. - Concepts for architectural frameworks. Types of architectures considered in international standards. - Development of architectural principles. - A model for managing the needs of stakeholders. - Architectural templates. - Business scenarios. Analysis of discrepancies. Planning migrations. - Ensuring architectural consistency and compatibility. - Methods for assessing readiness for transformation. - Scheduling based on capabilities. - Retrospective of software architectures. - The fragmentation of legacy applications; - Obsolescence of technology. - Business changes: mergers and acquisitions; process approach to managing an organization; - Integration of enterprise information systems with the systems of suppliers and customers. - The role of architecture in IT management processes. Modeling and inventory of IT services and IT resources. Tasks of the architect in the processes of change management, information system release management, incidents, defects and problems. - Prerequisites for the emergence of a service-oriented approach in architecture; - object-oriented analysis and design of information systems; - open Internet standards for the interaction of business applications, SOAP and RESTful web services; - enterprise architecture, business process management tools, application integration. - Designing the architecture of complex IT solutions, including the coordinated changes of several information systems and the construction of composite applications. High-level design of the solution. - Decomposition of business processes by systems. Development of software interfaces. - Infrastructure planning, deployment and maintenance. - Tasks of an architect in different phases of a traditional IT project. Cross-project activities. Optimization of the project portfolio. - The main information systems of the organization. Financial and accounting systems. Personnel management systems, workflow and teamwork. - Applications for maintaining relationships with customers, suppliers and customers. Website and corporate portal. Mobile applications. Application integration technologies. - Enterprise service bus, business process and business rules management systems, master data management. Persons who have attended the course and passed the exam receive a certificate of “Certified Information Systems Architect”.

Databases

MySQL Database Administration

(FOSS-DBA-MYSQL-101)

Training course: Administration of MySQL database management systems. This course provides the necessary set of knowledge and skills necessary for administering and maintaining the MySQL DBMS for versions 5. *, 8. *, as well as its fork - MariaDB 5. *, 10. * In order to confirm the readiness of the database administrator to work in productive corporate environments, the training course includes passing an exam in the form of testing in the following areas of knowledge: - MySQL - DBMS installation, architecture basics and initial setup; - Starting, stopping, rebooting, updating the DBMS; - Configuring security settings; - User account management, client authentication; - Creation of databases, access to them; - Structured Query Language (SQL); - Data types. Create, delete, update and clean up tables and fields; - Creation of records, their insertion, updating and selection; - Relationships of tables, keys, constraints, functions of joining and aggregation; - Transactions and definition of transaction parallelism. Locks; - Administration of the database server; - Localization and internationalization; - Backup and restore. Migration; - Setting limits and optimizing performance parameters; - Availability, load balancing and replication; - Monitoring the state of the DBMS, logging, statistics, tools. Individuals who have completed the course and passed the exam will receive a Certified MySQL Database Administrator certificate.

PostgreSQL Database Administration

(FOSS-DBA-PGSQL12-101)

Training Course: Administration of PostgreSQL Database Management Systems. This course provides the necessary set of knowledge and skills required to administer and maintain PostgreSQL DBMS for versions 9. *, 10,11,12. In order to confirm the readiness of the database administrator to work in productive corporate environments, the training course includes passing an exam in the form of testing in the following areas of knowledge: - PostgreSQL - DBMS installation, architecture basics and initial setup; - Starting, stopping, rebooting, updating the DBMS; - Configuring security settings; - User account management, client authentication; - Creation of databases, access to them; - Structured Query Language (SQL); - Data types. Create, delete, update and clean up tables and fields; - Creation of records, their insertion, updating and selection; - Relationships between tables, keys, constraints, join and aggregation functions; - Transactions and definition of transaction parallelism. Locks; - Administration of the database server; - Localization and internationalization; - Backup and restore. Migration; - Setting limits and optimizing performance parameters; - Availability, load balancing and replication; - Monitoring the state of the DBMS, logging, statistics, tools. Individuals who have completed the course and passed the exam will receive a Certified PostgreSQL Database Administrator certificate.

Backend development

Developing PHP Laravel \ Symfony Applications

(FOSS-DEV-BCK-LRVL-101)

Training Course: Developing PHP Laravel \ Symfony Applications. This course provides the necessary set of knowledge and skills required to develop PHP applications using the Laravel and Symfony frameworks. In order to confirm the readiness of the backend developer, the training course includes passing an exam in the form of testing in the following areas of knowledge: Installing and configuring Symfony; Installing and configuring Laravel; Using Laravel Artisan; Laravel and Symfony architecture; Routing and controllers; Place of routes and controllers in MVC; Creation of routes; Creation of controllers; Request object (injecting dependencies into the controller); Response object (answer correctly); Working with a database; Direct SQL queries; Query builder; Pagination; Migration; Eloquent ORM; Place the Model in MVC; Model creation; Types of relationships; The ratio is 1: 1; Ratio 1: N; N: N ratio; Bundles of relations (or join [s] in ORM); Templates and Components; Place of Templates in MVC; Blade template engine; Forms; Component creation; Practical work; Intermediaries and Providers; Mediators and providers in MVC; Creation of Providers; The compassion of the Intermediaries; Validation and Authentication; Sessions in Laravel; Authentication; Extended capabilities; Uploading files; Queues; Using Vue.js components; Using Angular Components; Using React components; Individuals who have attended the course and passed the exam will receive a certificate “Certified PHP Laravel \ Symfony Backend Developer”.

Java backend development

(FOSS-DEV-BCK-SPR-101)

Training course: Java Spring Backend Development Content: The course consists of topics developed based on the requirements of employers of a Java developer. language syntax; work with Git; objects and classes; numbers, strings and dates; arrays and collections; inheritance and polymorphism; features of OOP in Java; exceptions, debugging, testing and logging; work with files and the network; SQL query language; work with databases; multithreading; web application development; non-relational databases; optimization of code and applications; distributed storage and computing. HTTP protocol; algorithms and data structures; design patterns. Individuals who attend the course and pass the exam receive a Certified Java Backend Developer certificate.

Frontend development

JavaScript Frontend Development

(FOSS-DEV-FNT-JS-101)

Training course: JavaScript Frontend Development You will learn the basics of HTML, CSS and JavaScript, learn how to create websites and applications for any device, optimize code and work with animation, and as a result, you will become a sought-after specialist in the IT field. Course composition: Web layout; Introductory module; HTML; Basics of CSS; JavaScript basics; Adaptability and cross-browser compatibility; Registration; Advanced CSS; Layout tools; Online web development sessions; JQuery library; Adaptation of the layout for mobile devices; Workshop on interactive elements; What is Webpack; Building a Gulp project and an overview of the Sass preprocessor; Animation in CSS; JavaScript; Acquaintance with the language; Basics; Functions; Arrays and Objects; Closures; Objects and constructors; Object Oriented Programming; Miscellanea; JavaScript in the browser, DOM; Web API; Client and server; jQuery; Modern JavaScript; Assembling projects; React; Redux; Persons who have attended the course and passed the exam receive a certificate "Certified Front End Developer"

Developing Angular Front End Applications

(FOSS-DEV-FNT-JS-ANG-101)

Training Course: Developing Angular Front End Applications. This course provides the necessary set of knowledge and skills required to develop applications using the Angular framework. In order to confirm the readiness of the developer, the training course includes passing an exam in the form of testing in the following areas of knowledge: Environment and component approach Angular-cli and ecosystem; Environment settings and configuration; The basic mechanisms of work and the essence of the Angular framework, components; Angular template syntax specifics, interpolation and linking; Nested components and passing data to and from a component; Passing content to the component using ng-content (content projection); Access to template elements via ViewChild / ViewChildren / ContentChild / ContentChildren; Directives and Pipe for solving everyday tasks; Out of the box directives (ngIf, ngClass, ngFor ..); Pipe out of the box (json, async, currency ..). The nuances of Impure pipes; Filtering data using pipes, custom directives; The nuances of the ViewRef / TemplateRef; Services, networking and dependency injection; The concept and methods of creating providers; Providers for working with HTTP (S), requests to the server; Services for transferring data between components, creating dynamic components; Forms and data validation; Creation of forms "from the template" (template-driven forms); Creation of forms "from the component" (reactive forms); Synchronous and asynchronous data validation; Complex form elements, ValueAccessor; Navigation and routing in the application; Definition of state in the application, nested and abstract states; Service for accessing state parameters and transferring data between states; Optimizing the application, using lazy loading and state preloading; Redux architecture for more complex applications Basic concepts, organization of the application with Redux; NgRX platform and its modules; Handling asynchronous events and side effects; Aggregating data using selectors; Testing Angular applications; TDD / BDD development; Unit tests for services; Testing specifics when using HttpClient; Unit tests for directives, components and pipes; Additional topics, answers to questions; Questions on topics that were not included in the main program of the course; Using ZoneJS / NgZone for convenient management of asynchrony; State update mechanism (change detection), OnPush strategy; Individuals who have attended the course and passed the exam receive a Certified Angular Front-End Developer certificate.

Developing Frontend React.js Applications

(FOSS-DEV-FNT-JS-RCT-101)

Training Course: Developing Frontend React.js Applications This course provides the necessary set of knowledge and skills required to develop applications using the React.js framework. In order to confirm the readiness of the front-end developer, the training course includes passing an exam in the form of testing in the following areas of knowledge: React and its ecosystem. The difference between React.js and other popular frameworks. Working with create-react-app. Virtual DOM, JSX. React Hooks, their differences from state and lifecycle methods. Examples of testing components using Jest and Enzyme. Styles with css modules. Reuse code with inheritance, decorators, and custom hooks. DOM communication: keys & refs. Connecting third-party components. Building Applications with React: Redux.js Features of Redux.js: functional approach, Redux dev tools. Store as an immutable object: Redux + Immutable.js. Synchronous flow with Redux, reuse of previously created components. React-redux for linking components with logic. Memoized selectors reselect. Side-effects in Redux: Creating and Using Middlewares. Receiving data from the server. Asynchronous actions with redux-thunk React for SPA: react-router and advanced React APIs Single-page applications development Routing react-router v5. Setting up nested routes. Setting up history for the application. Combining react-router and Redux. Server error handling and declarative router management. Context is a data transfer mechanism. Advanced API react-router. props.children for component composition. Animations in React, CSSTransitionGroup. Formik. Authorization in React applications. Different approaches to composition of reducers, pros and cons. Redux Ducks. Options for working with side effects: redux-thunk, redux-promise, redux-loop, redux-saga. Working with sagas, testing them. Testing React Components. Drag-N-Drop with react-dnd. Frameworks for React: GraphQL, as a query language, features and implementation. Apollo, a client for GraphQL. Building Universal Applications, NextJS React Native: Setting up the React Native environment. Analysis of the basic principles and differences from working in a browser. Basic React Native components. Styles for React Native, Flexbox. Navigation with React Navigation. MobX: MobX Basics. Building an application architecture. Working with data. Working with the network. Individuals who take the course and pass the exam receive a Certified React Front-End Developer certificate.

Developing Frontend Vue.js Applications

(FOSS-DEV-FNT-JS-VUE-101)

Training Course: Developing Frontend Vue.js Applications This course provides the necessary set of knowledge and skills required to develop applications using the Vue.js framework. In order to confirm the readiness of the front-end developer, the training course includes passing an exam in the form of testing in the following areas of knowledge: Vue.js templates; Vue.js reactivity, computed properties, change tracking; Event handling; Working with forms; Animations; Lifecycle hooks Components in Vue.js Component approach; Component creation; Interaction of components in Vue 2 and Vue 3; Slots; Application development with Vue.js; Building the application; Assembly organization, tools; Single file components; Scoped styles; Configuring webpack for Vue.js development; Vue CLI; Building applications with @ vue / cli; Application development and assembly via vue-cli-service; Build and Application Configuration; Development of single page applications with Vue.js; Single Page Applications (SPA) versus traditional web applications; Client-side routing, vue-router; Parameterized and nested routes; Interaction with API, receiving data on routes; Unit testing with Jest; Testing a Vue.js application with Jest and vue-test-utils; Vue.observable and reactive; Virtual DOM in Vue.js and what is important to know when working with it; Render function; Vue.js limitations and work with other libraries; Dynamic components; Form components and unidirectional data flow; Extending Vue.js and reusing logic; Special ways of interaction between components; Event bus and ways of its implementation; The portal-vue and Teleport library from Vue 3; Where and how can global data be stored in the application; Provide / Inject in Vue 2 and Vue 3; Scoped Slots; Custom directives; Mixins; Plugins; Vuex and architectural aspects of the project; Flux pattern: implementation with vuex library; Vuex modules; Working with forms in vuex; Application architecture and organization of work with API; Error processing; Some component patterns; Router Guards; Authentication. Individuals who have attended the course and passed the exam will receive a Certified Vue.js Front-End Developer certificate.

Mobile development

Developing mobile applications for the Android operating system

(FOSS-DEV-MOB-AND-101)

Training course: Developing mobile applications for the Android operating system - Android mobile developer. You will master a demanded profession and learn how to create applications on Android, gain skills in developing complex UX / UI solutions and be able to expand the functionality of the product. Introduction to Android Development; Build and Resources; Kotlin basics: syntax, conditions, functions, loops; Kotlin basics: OOP, classes and objects; Kotlin basics: higher-order functions, exceptions and annotations; Application layout and data presentation; Layout using ConstraintLayout; Activity life cycle; Opening new screens; Fragments; Working with ViewPager and dialogs; Lists; Lists. Best practices; Permissions, work with date and time; Android jetpack: ViewModel, Navigation; Multithreading; Working with an Internet connection; Data exchange over the network. Retrofit library; Kotlin coroutines; Working with files; Working with images; ContentProvider function; Database. Introductory lesson; Databases in Android; Alerts (push notifications); Flow; Executing tasks in the background; Material design concept; Dependency Injection Basics; Preparing the application for release. Individuals who have taken the course and passed the exam receive a Certified Android Developer certificate.

Operating systems

Linux operating systems administration (Debian\CentOS)

(FOSS-OSA-DEB-CEN-101)

Training Course: Operating System Administration Debian 8-10 \ CentOS 7-8 Linux (Debian / CentOS Operating Systems Administrator) This course provides the necessary set of knowledge and skills required to administer and maintain free open source operating systems. Debian Linux versions 8, 9, 10; CentOS Linux versions 7, 8; in a working environment. In order to confirm the readiness of the administrator of operating systems to work in productive corporate environments, the training course includes passing an exam in the form of testing in the following areas of knowledge: - Basics of the architecture of Linux operating systems, features of Linux distributions; - Installation and initial configuration of Linux operating systems; - Disk subsystem; - Network subsystem; - Command line; - Start, stop, reboot, update. Repositories and package manager management; - Configuring the security settings of the operating system; - User account management, role model; - Localization and internationalization; - Linux backup and recovery; - Setting limits and optimizing performance parameters; - Monitoring the state of the OS, logging, tools. Individuals who have completed the course and passed the exam receive a Certified Linux Administrator certificate.

Information security

Information security audit

(ISMS-AUD-ISS-101)

Training course: Information security audit. This course provides the necessary set of knowledge and skills required to perform an information security audit. In order to confirm the readiness of the information security auditor, the training course includes passing an exam in the form of testing in the following areas of knowledge: Information, types of information, information security, information security methods. - Objects of protection (assets) and threats. The concepts of assets, threats, vulnerabilities. Other basic terms and definitions of information security - Information security risks concepts, approaches, risk management strategies and their processing. - Typical risks in ensuring the uninterrupted operation of Information systems. Approaches to IS Management ISO standards. Purpose of the standards ISO 27000, 27001, ISO 27002, 27005 and others. - Mechanism of interaction and application of standards. Structure. Terms. Definitions. - Support in building an ISMS from the management. Scope of the ISMS and IS Policy. - Determination of the Scope of the ISMS (ISMS boundaries), on the examples of ensuring the smooth operation of Information systems, the Concept and policy of IS, methods and examples of their formation. - Inventory of assets. Creation of the Register of the Organization's assets, their assessment and ranking (On the examples of ensuring the smooth operation of Information systems). Determining the value of assets. - Typical asset protection vulnerabilities in organizations certified for IS IS. Assessment of threats, possible damage. Criteria for evaluation. - Analysis and assessment of risks. - Ways to deal with risks, reducing the likelihood of implementation, ways to reduce damage when risks are realized. Choice of strategies and recommendation of Standards. Justification for the need to accept documents: - Regulations on work with assets Instruction on ensuring the safety of commercial and official secrets Rules of work in public places - Rules for hiring, internal regulations and dismissal of employees Procedure for access to the office Business continuity plan - Rules for conducting internal audit Policy for the protection of intellectual property rights Rules for managing inconsistencies Rules for analyzing the ISMS by management - Regulations on the modification of IS and others, their role in the construction of an ISMS. Residual risks. - Completion of the ISMS implementation. - Matrix of applicability. ISMS records. Mechanisms for reviewing and revising the ISMS. - Working documentation of the ISMS, execution of the created procedures. The structure of the documentation. Verification of ISMS documentation execution by auditors of the authorized organization. Checking the vulnerability of software and hardware information security scanners. Preparation for IS certification. - ISMS certification. Steps in the certification process, timing and indicative budget. - Information security audit, information security incident handling, Business continuity plans. - Audit planning. Auditor training. Documents. Collecting evidence. Auditing technique. Record keeping. Formulation of inconsistencies. Persons who have attended the course and passed the exam receive a certificate of “Certified Information Security Auditor”.

Information security management

(ISMS-MGR-ISS-101)

Training course: Information Security Management. This course provides the necessary set of knowledge and skills required to ensure information security. In order to confirm the readiness of the information security manager, the training course includes passing an exam in the form of testing in the following areas of knowledge: - Analysis of the protected object Formulation of the problem. Analysis of the structure of the information system. Analysis of information flows - Threat models and intruder models The concept of threats and their sources. Channels of information leakage and methods for assessing their information content. Threats identification method. Informal intruder models - Assessment of information security risks Information security risk concept. Risk assessment methods. Assessment of the likelihood of threats being realized Assets valuation methods - Information Security Management System The concept of information security management problem. Information security management system model. Private management ISMS. ISMS certification - Information security policy The concept of an organization's information security policy. Information security policy development principles. Role of the organization's management and information security service - Information security incident management Information security incident concept. Classification of information security incidents. Assessment of the consequences of information security incidents - Information security management standards International information security standards. Group of standards for information security. Information security incident handling. - Information security audit. Protection recommendations. Best Information Security Practices Individuals who have attended the course and passed the exam receive a Certified Information Security Manager certificate.

Vulnerability management

(ISMS-VM-ISS-101)

Training Course: Vulnerability Management. This course provides the necessary set of knowledge and skills required to support the vulnerability management process. The process of managing vulnerabilities (Vulnerability management) is one of the key processes in building an integrated information security system, aimed at reducing the damage from the implementation of threats caused by infrastructure vulnerabilities. As a rule, all components of the company's IT infrastructure, such as: servers, workstations, mobile devices, network equipment, databases, application software contain vulnerabilities - therefore, maintaining the required level of information protection in such a system is a complex task that a vulnerability management specialist solves . In order to confirm the readiness of a vulnerability management specialist, the training course includes passing an exam in the form of testing in the following areas of knowledge: - Analysis of the object of protection. Formulation of the problem. Analysis of the structure of the information system. Analysis of information flows - Threat models and intruder models. The concept of threats and their sources. Channels of information leakage and methods for assessing their informativity. Threat identification methodology. Informal Models of the Violator - Risk assessment of information security violations. The concept of information security risk. Risk assessment methods. Evaluation of the probability of the implementation of threats. Asset valuation methods - Information security audit. Recommendations for protection. Best Information Security Practices - Stages of vulnerability management. Planning and conducting a technical survey of network and information infrastructure; - Inventory and construction of an interactive network map with further prioritization of assets. Determination of the list of assets to be analyzed for vulnerabilities. - Scanning infrastructure with software and hardware to identify vulnerabilities; Preparation of a plan to eliminate vulnerabilities and directly eliminate vulnerabilities. - Control testing to confirm the result of the elimination of vulnerabilities. - Hunting for vulnerabilities (Bug Bounty) and penetration testing. - Typical vulnerabilities in wired and wireless networks. - Typical vulnerabilities in the hardware of workstations, mobile devices, server and telecommunications equipment. - Typical vulnerabilities in operating systems and application software. - Typical vulnerabilities in the back end of applications: insecure configuration of components, LFI/RFI, ways to obtain RCE, SSTI. - Typical vulnerabilities in the client side of applications: XSS, CSRF, ClickJacking and others. - Analysis of critical vulnerabilities in web applications (SSRF, XXE, SQLi, authentication bypass and others). - Reverse engineering of applications, search and exploitation of binary vulnerabilities - Continuous assessment of the state of safety and compliance. - Identification of compromised assets and zero-day vulnerabilities. - Tracking the status of a vulnerability over time. - Installation of updates in their absence and generation of patches. - Exception management. Individuals who complete the course and pass the exam receive the "Certified Vulnerability Management Specialist" certificate.

Corporate procurements

Corporate procurement management

(PROC-MGR-CRP-101)

Training course: Corporate procurements Work in ISEZ 2.0. Provisions on procurement. Registration on the portal www.zakup.sk.kz. Portal overview. Supplier's personal account. Customers of the Fund. New requirements for subsoil users of the Holding. Procurement in accordance with the Standard and The procedure for applying special conditions for the procurement of goods, works and services provided for by the Procedure for procurement Subsoil users of the Holding. Restrictions related to participation in procurement. Responsibility of the Supplier. Rules for the formation, maintenance and approval of the List of unreliable potential suppliers (suppliers) of the Holding. Support for manufacturers of goods included in the Register of Producers of the Holding. Request for Quotations. Request for Quotations with a Down Bidding. Qualification requirements for a potential supplier in the RFP method. Online submission of a price offer. Bidding. Grounds for recognizing a potential supplier as not complying with the qualification requirements. Determination of the winner. Conditions for concluding a contract. Reasons and grounds for using this method. Terms and conditions for inviting a supplier. Tender through competitive negotiations. Search for suitable locations by field of activity of the course participants. Rules for concluding a contract using a single source method. Procedures for identifying a supplier in a tender through competitive negotiations. Prequalification of potential suppliers. Principles of prequalification of potential suppliers. Prequalification restrictions. Collection and analysis of statements from potential suppliers. Potential supplier survey. Consideration and evaluation of the personal data of a potential supplier. Open Tender. Open tender with short bidding. Two-stage tender. Closed tender. Tender among PKOs. Tender documentation for procurement from qualified potential suppliers. Qualification requirements for a potential supplier. Changes to tender documents. Clarification of the provisions of the tender documents. Tender documentation. Collection of applications for the tender. Complete collection of documents for the tender. Online submission of all documents. Securing the application in the tender on a general basis. Dumping. Consideration of applications in the tender and determination of the winner. Preliminary consideration of applications. Correction of errors by the Supplier. Accrual of Conditional Discounts. Cancellation of the accrual of conditional discounts under the Special Procurement Procedure among qualified potential suppliers. Determination of the rating in the tender among PKOs. Determination of the winner. Results protocol. Conclusion of a contract for the procurement of goods, works, services. Implementation of the conclusion of an electronic contract on the portal. Features of the conclusion of the contract. Enforcement of the contract. Execution of the contract. Changes to the contract. Evasion of the conclusion of the contract. Calculation of local content. Responsibility for non-compliance with local content in the contract. Individuals who have completed the course and passed the exam receive a Certified Corporate Procurement Specialist certificate.

Government procurements

Government procurements management

(PROC-MGR-GOV-101)

Training course: Government procurements management. Legislation of the Republic of Kazakhstan on regulated procurement. Review of all types of procurement in the Republic of Kazakhstan. Basic concepts used in the Law and Rules. Receiving an EDS on the portal www.egov.kz. EDS installation on a computer. Installation of additional programs for work in procurement. Installing the NCALayer program. Registration on the portal www.goszakup.gov.kz. Portal overview. Paid access. Work on the portal. Supplier's personal account. Online wallet. Replenishment of the wallet. Responsibility of Customers and Organizers. Appeal against the actions (omissions) of the customer and the organizer. Supplier liability. The register of unscrupulous participants with changes. Public procurement methods. Request for Quotations. Securing the application 1% in the RFP. Submission deadline. Determination of the winner. Conditions for concluding a contract. Data sheet. Indication of brands, trademarks and other characteristics in certain cases. Reasons and grounds for using this method. Participation in purchases using the "From one source for failed purchases" method. Participation in procurement by the "Open tender", "Open tender with preliminary qualification selection" and "Auction" method. The similarities and differences between these methods. Financial stability. Indicator of taxes paid. Formula. Industrial certificate. Features of participation in the PKO Competition. Qualification requirements for a potential supplier. Preliminary discussion of the tender and auction documentation. Tender and auction documentation. Grounds for rejecting potential suppliers. Securing the application in the competition and auction. Dumping. Anti-dumping measures in public procurement. Consideration of applications in competition and auction. Holding an auction. Determination of the winner. Conditional discount under the new rules. Methodology for applying conditional discounts. Persons who attended the course and passed the exam receive a certificate "Certified Public Procurement Specialist"