Skip to content
  • Sign In
  • Try Now
View all events
Bitcoin

Blockchain, Bitcoin and Cybersecurity Beginner's Guide

Published by Pearson

Beginner to intermediate content levelBeginner to intermediate

Start your blockchain journey

Blockchain and Bitcoins are becoming mainstream. Many people believe cryptocurrency is the next gold rush, investing in projects without truly understanding how they work. This course is a mix of Blockchain history and demos so you can gain an understanding of Blockchain, the technology behind Bitcoin, and other cryptocurrencies while seeing real-world practical use cases. it. You will also learn how Bitcoins and competing technologies are used today and how you can get involved in helping organizations implement blockchain technologies for their IT strategies. We will also look at the future of Blockchain, how it is being used currently in the financial medical, health, and consumer markets and how that might change.

Throughout this course you will see real examples for using Blockchain. You will also learn the answers to the questions you’ve always wanted to know: How did blockchain start? What is cryptocurrency’s effect on the blockchain? How are IT organizations using blockchain technologies now and what is planned for the future? Get ready to drink from the firehouse with this 4-hour in-depth introduction to blockchain technologies.

What you’ll learn and how you can apply it

By the end of the live online course, you’ll understand:

  • Understanding blockchain and its origins
  • Understanding cryptocurrency’s effect on blockchain
  • How IT organizations use blockchain technologies

And you’ll be able to:

  • Describe and understand blockchain basic techniques
  • Understand how organizations are using blockchain techniques
  • Understand the competitive landscape around blockchain technologies

This live event is for you because...

  • IT Professionals who are interested in learning about blockchain technologies
  • Cybersecurity professionals who are worried about blockchain exploits
  • Professionals are brand new on how blockchains are used beyond cryptocurrency.

Prerequisites

Recommended Follow-up

Schedule

The time frames are only estimates and may vary according to how the class is progressing.

Segment 1: Blockchain Origins (70 minutes)

  • What is blockchain and how does it work?
  • Understanding blockchain hashing functions
  • An introduction to Proof of Work
  • Knowing the difference between proof of work and proof of stake
  • What are the origins of blockchain and why was it created?
  • Gaining an understanding of the major types of cryptocurrencies
  • Understanding the Bitcoin blockchain
  • How can cryptocurrencies be purchased, mined, and traded?
  • Exploring how to use cryptocurrency to buy goods and services and exchange it for fiat currency.
  • Understanding the differences between Etherum blockchain and other blockchains
  • Recognizing the security risks and other vulnerabilities around major cryptocurrencies
  • A look at private blockchains and how they are used

Break (10 minutes)

Segment 2: Blockchains used in cryptocurrency (70 minutes)

  • How cryptocurrencies pushed blockchain
  • Blockchain applications and how they work
  • Understanding and using smart contracts
  • Alternate public blockchains used for cryptocurrencies

Break (10 minutes)

Segment 3: Blockchains Projects and Organizational Use Cases with Demos (70 minutes)

  • Exploring how corporations and IT departments use blockchain technologies
  • Looking into supply chain applications with blockchain
  • Advantages of blockchain with crowd-sourced and peer reviewed IT applications
  • Some blockchain and cybersecurity concerns
  • A quick peek into new blockchain technologies such as NFTs and hyperledgers

Q&A and Course wrap-up (10 minutes)

  • Next steps you can take

Your Instructor

  • Aamir Lakhani

    Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations.

    Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. Mr. Lakhani is considered an industry leader for creating detailed security architectures within complex computing environments. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet’s dark security movement. He is the author or contributor of several books, and has appeared on FOX Business News, National Public Radio, and other media outlets as an expert on cybersecurity.

    Writing under the pseudonym Dr. Chaos, Mr. Lakhani also operates the popular security social media blog which is hosted at DrChaos.com. In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as “a blogger, InfoSec specialist, super hero…and all around good guy.”

    linkedinXlinksearch