If you are interested in a piece, try us contact
Jirka's passion for imparting experience and knowledge to perfectly developed courses and trainings. He improves his teaching skills with foreign lecturers. He uses modern technology, new approaches, visualizations, labs for his courses.
Jirka is an expert in open source and shares his knowledge in our Linux, Ansible, containerization, OpenShift, Kubernetes, ArgoCD, Grafana, Proxmox courses.
Jiří leads a team focused on the development and operation of web and mobile applications. He is a Linux system administrator and information technology and banking infrastructure architect. Experienced in automation, optimization, infrastructure architecture and application design.
His certifications: Red Hat Certified Trainer of the Year (2019) EMEA - DevOps, Red Hat Certified Specialist in Hybrid Cloud Management, Red Hat Certified Architect Level III, Red Hat Certified Specialist in OpenShift Application Development
If you want to be a cybersecurity expert and become a security architect, we have great news for you. We have prepared a series of courses that will help you fully master the issue of strategic design of the safety and security of the organization.
The new certification model includes five levels of expertise, encompassing several certifications. This allows individuals to more easily choose suitable courses and exams based on their job positions and intended career paths.
We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?
If you want to be a cybersecurity expert and become a security architect, we have great news for you. We have prepared a series of courses that will help you fully master the issue of strategic design of the safety and security of the organization.
The new certification model includes five levels of expertise, encompassing several certifications. This allows individuals to more easily choose suitable courses and exams based on their job positions and intended career paths.
We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?