Helpdesk for Students from Ukraine


We invite you to FREE TRAININGS for students of the Vistula University, which are implemented as part of the project “Integrated Vistula of the Future”.



The trainings are addressed to full-time and part-time students of the 1st and 2nd degree studies who are not on the 1st and 2nd semester of bachelor studies. The trainings are conducted as part of the project „Integrated Vistula of the Future”.


Submit your applications to:


  • Cloud Computing: Software Architecture of Distributed systems for IoT and Hight volume – introduction

    Training details:

    • Distributed system – What it is? Why we need them?
    • IoT and High Volume systems
    • Distributed processing
    • Communication inside and outside distributed systems
    • Data storage in distributed systems
    • Eventually Consistent
    • CAP theory
    • BASE and ACID
    • Vertical and Horizontal Scalability
    • Stateless and Stateful services
    • RDBS and NoSQL in distributed systems
    • Synchronous and Asynchronous processing
    • Client-Server and Events
    • Distributed Microservices
    • Services discovery and network distribution
    • Monitoring and Diagnostics of distributed systems
  • Cloud Computing: Software Architekture of Distributed systems for IoT and Hight volume – extension

    Training details:

    • Quick recap of introduction part
    • Services
    • Distributed computing
    • Communication in distributed systems
    • Distributed storage
    • Distributed cache
    • Upgrade of distributed systems
    • Big picture
  • Cloud Computing: Architecting on AWS

    Training details:

    •  Core AWS Knowledge
    • Core AWS Services
    • Designing your Environment
    • Making your Environment HA
    • Forklifting an Existing Application onto AWS
    • Event-Driven Scaling
    • Automating
    • Decoupling
    • Build a new environment
    • The Well-Architected Framework
    • Troubleshooting Your Environment
    • Large-Scale Design Patterns and Case Studies
  • Management: From PMI to ITIL - what methodology to choose

    Training details:

    • general approach to project management, methodologies,
    • MSF methodology (Microsoft Solution Framework),
    • PMI (Project Management Institute) methodology, explanation of the Prince2 methodology,
    • Scrum methodology, discussion of the ITIL methodology,
    • discussion of other methodologies,
    • indication of main features for specific methodologies.
  • Management: Challenge of Egypt Project Management

    Training details:

    • Learn how to apply Project Management best practices and learn the essence of Prince2®, PMI®, PMBOK®
    • Learn how to ensure the business case is realized
    • Learn how to stay customer focused and set the right priorities based on customer requirements
    • Develop communication and team competences.
  • Virtualization: Creating laboratory environments. Architecture and implementation

    Ways of preparation and distribution of training environments in the context of use at universities. Students learn how they can create a machine / machine that is the source of their work in the subject or semester scale. The classes will present examples of creating many environments.

  • Security: GDPR in the business management process

    Workshop details:

    • the life cycle of personal data in the enterprise,
    • RBA in practice,
    • how a badly defined process reduces security,
    • use of ISO 27001 to design a security system for processing personal data, case study.
  • Security: GDPR from the IT perspective

    Workshop details:

    • Threats and vulnerabilities
    • Explanation of cyber threats and vulnerabilities,
    • Demo – attack on a badly secured system and an uneducated employee, exploitation of vulnerability,
    • What does the GDPR say about the protection of personal data from the technical side
    • Risk-related safeguards
    • Computer protection,
    • Protection of mobile devices,
    • IT systems protection,
    • Risk analysis and adequate security systems on the example of electronic mail,
    • Classes of discussed solutions: anti-malware, anti-phishing, zero-day, user behavior analysis using machine learning, DLP, PAM, NAC, IRM, ITSM,
    • Continuous monitoring and incident management process,
    • The role of SIEM / SOC solutions in building security,
    • A response incident, what should happen if an attack has occurred,
    • Computer forensics analysis.
    • Incident management procedure
    • Incident management procedure in practice
  • Cloud Computing: Cases of use of various types of clouds

    The scope of the workshop includes working with various types of clouds (IaaS, PaaS, SaaS) and various cloud providers. The training responds to the needs of providing hybrid cloud environments and OnPremise solutions.

Apply online

Ta strona internetowa wykorzystuje ciasteczka (cookies), by polepszyć Twój komfort korzystania z naszej strony. Aby nadal móc korzystać z tej strony, musisz wyrazić zgodę na nasze wykorzystanie tych plików. więcej

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.