Certified Blockchain Solutions Architect


Certified Blockchain Solutions Architect, Singapore elarning online course

Course Description

Welcome to the Certified Blockchain Solutions Architect (CBSA) LiveLessons Course. This course is ideal for technology-focused engineers, application developers, IT administrators, or anyone wanting to obtain the Blockchain Training Alliance Certified Blockchain Solutions Architect Certifications.
In this course, we will provide an exam overview of the Blockchain Training Alliance Certification, Certified Blockchain Solutions Architect (CBSA). This will include Blockchain basics such as components, terminology, and ledgers, as well as why Blockchain is revolutionizing how businesses and governments are looking at technology to create efficiencies. We will cover the top ten areas to focus on for the exam and what topics to study, as well as the exam process and what to expect before, during, and after the exam.


Course Objectives

• Examination Overview of Blockchain Training Alliance Certification, Certified Blockchain Solutions Architect (CBSA)
- Learn about the basics of Blockchain e.g. components, terminology, and ledgers 
- Learn about why Blockchain is revolutionizing how businesses and governments are looking at technology to create efficiencies
- Top 10 areas to focus on for the examination
- What are the topics to study for the examination?
- How is the examination process like?
- What to expect, before, during, and after the examination?


Related Courses

  • Certified Cyber Threat Intelligence Analyst

    Certified Cyber Threat Intelligence Analyst

    SGD $299.00

    Course Description

    The Cyber Security Threat Intelligence Researcher Certification will help you acquire the skills needed to find out who is behind an attack, what the specific threat group is, the nation from which the attack is being launched, as well as techniques being used to launch this attack. You will know how to take a small piece of malware, find out who is responsible for launching it, the threat actor location and also how to take down that threat actor, with the support of your local law enforcement. In today’s cyber security landscape, it isn't possible to prevent every attacks. Today’s attackers have significant funding, are patient, sophisticated, and target vulnerabilities in people and processes as well as technologies. With organizations increasingly relying on digitized information and sharing vast amounts of data across the globe, they have become easier targets for many different forms of attack. As a result, every company’s day-to-day operations, data and intellectual property are seriously at risk. In a corporate context, a cyber attack can not only damage your brand and reputation, it can also result in loss of competitive advantage, create legal/regulatory noncompliance and cause steep financial damage. Today’s secure environment will have vulnerabilities in it tomorrow, so an organization cannot allow itself to become complacent. There is only so much an organization can do by defending itself against threats that have already occurred. If an organization only reacts to new threats as they come up, are likely acting too late. It is important to understand and prioritize cyber threat intelligence processes, and how they can be integrated into an organization’s security operations in a way that adds value.  Cyber threat intelligence (CTI) is an advanced process enabling organizations to gather valuable insights based on analysis of contextual and situational risks. These processes can be tailored to the organization’s specific threat landscape, industry and market. This intelligence can make a significant difference to organizations' abilities to anticipate breaches before they occur. Giving organizations the ability to respond quickly, decisively and effectively to confirmed breaches allows them to proactively maneuver defense mechanisms into place, prior to and during the attack. In this course, we’ll introduce you to the 8 phases of threat intelligence: Hunting - The goal of hunting is to establish techniques to collect samples from different sources that help to start profiling malicious threat actors. Features Extraction - The goal of Features Extraction is to identify unique Static features in the binaries that help to classify them into a specific malicious group. Behavior Extraction - The goal of Behavior Extraction is to identify unique Dynamic features in the binaries that help to classify them into a specific malicious group. Clustering and Correlation -  The goal of Clustering and Correlation is to classify malware based on Features and Behavior extracted and correlate the information to understand the attack flow. Threat Actor Attribution - The goal of Threat Actors is to locate the threat actors behind the malicious clusters identified. Tracking - The goal of tracking is to anticipate new attacks and identify new variants proactively. Taking Down - The goal of Taking down is to Dismantled Organized Crime Operations

    Read more...

  • Data Security and Privacy Training

    Data Security and Privacy Training

    SGD $299.00

    Course Description

    Did you know the number of data records compromised in publicly disclosed data breaches surpassed 2.5 billion in 2017. And as we all know, Facebook announced a data breach in 2018, where 87 million user accounts were compromised Our data is being compromised more than ever. Training all employees on how to protect themselves against attacks is one of the most effective ways to protect your organization. Course Objectives The objective of this training is to ensure that all your employees can clearly Identify, Mitigate and Report any potential cyber threats to your organization. Training Approach This training offers a fresh approach by presenting engaging content in a scenario-based format. This training uses micro-learning methodology to ensure learners aren’t overwhelmed with information. Throughout the course, the learner will take interactive quizzes and assessments to test their readiness. The training is available on-demand so learners can take at their own pace or part of a designated employee training program. Who’s this for? This compliance training is designed for all employee role types from office administration to CXO. This course will cover the following topics: Course Topics What is Information Security What are Threats How to Practice Information Security at Work Email Safety and Safe Online Browsing Implementing a Security Policy

    Read more...

  • Google Cloud Platform for AWS Professionals & GCP Security Fundamentals

    Google Cloud Platform for AWS Professionals & GCP Security Fundamentals

    SGD $20.00

    Course Description

    AWS Professionals. This course is meant for IT professionals that are knowledgeable in AWS and are looking to get a quick ramp up in comparing Google Cloud Platform to Amazon Web Services at a functional level. This course covers most of the services. The Services covered are. 1)  Networking   2)  Storage   3)  Data Services   4)  Management Security in the cloud is much like security in your on-premise data centers, only without the costs of maintaining facilities and hardware. In the cloud, security is generally a shared responsibility between the provider and the customer. With Google Cloud Platform there are many facets of maintaining a secure cloud environment and in this course we will cover them.  

    Read more...


Content

Certified Blockchain Solutions Architect(CBSA)

+
Course Trailer

1 Course and Instructor Intro

2 What is a CBSA

3 Exam Questions

4 Objectives

5 Pretest

6 Blockchain all or Nothing

Blockchain 101 - Terminology and Components

7 Blockchain Terminology

8 Blockchain Components

Objective - The difference between proof of work, proof of stake, and other proof systems and why they exist

9 Difference between Consensus and why they exist

"Objective - Why cryptocurrency is needed on certain types of blockchains"

10 Cryptocurrency Needed or not?

Objective - The difference between public, private, and permissioned blockchains

11 Difference Between public, private or permissioned

Objective – How Blocks are written to a blockchain

12 How blocks are written to blockchain

13 Demo Block Activity

Objective – Where cryptography fits into blockchain and the most commonly used systems

14 Cryptography fits into blockchain

15 Demo - LTC Wallet

Objective – Database or Blockchain

16 Database or Blockchain?

Objective – The common use cases for public blockchains

17 Commom Use Cases for public blockchains

Objective – Common use cases for private & permissioned blockchains

18 Common Use Cases for private blockchains

Objective - What is needed to launch your own blockchain

19 Launching your blockchain

Objective – Segwits and Forks

20 Segwits and Forks

Objective – When is mining needed and when it is not

21 Mining Requirements

22 Genesis Mining

Objective – Byzantine Fault Tolerance

23 Byzantine Fault Tolerance

Objective – Consensus among Blockchains

24 Consensus

Objective – Hashing

25 Hashing Overview

26 Demo - Anders Hashing Demo

Objective – Security in Blockchain and how addresses, public keys, and private keys work

27 Security in Blockchains

Objective – What is a smart contract and dApps?

28 Smart Contracts and Dapps

Objective – History of Blockchain

29 History of Blockchain

Objective – The programming languages of the most common blockchains

30 Blockchain Programming

Objective – Common testing and deployment practices for blockchains and blockchain-based apps

31 Deploy and Test Apps

32 Demo Metamask

Objective – Value Creation

33 Value Creation

Objective – Blockchain Key Components

34 Key Components

Objective – Blockchain Architecture

35 Blockchain Architecture

36 Enterprise Blockchains

Objective – Bitcoin Improvement Protocols

37 Bitcoin Improvement Protocols (BIP)

Objectives – Hyperledger

38 Hyperledger Project

39 Hyperledger Fabric

40 Demo - IBM Blockchain as a Service

Objective – Hyperledger Composer

41 Hyperledger Composer

42 Demo - Hyperledger Composer Playground

43 Hyperledger Composer Playground

Objective - Hyperledger Chaincode

44 Hyperledger Chaincode

45 Whiteboard - Hyperledger Fabric

46 Hyperledger Wiki

Objective - Ethereum

47 Ethereum Overview

48 Ethereum EVM

49 Ethereum Browsers

50 Ethereum Development

51 Demo - Etherscan

52 Demo - Ethernodes

Course Wrapup

53 Blockchain Terminology Review

54 Taking the CBSA Exam

55 Discount Code Demo

56 Blockchain Roles

57 Bonus -Corda Whiteboard

58 Bonus -Corda DemoBench

59 Bonus - Ethereum Security

60 Bonus - Ether Gas

61 Bonus - BTC Explorer

SGD $29.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.