Certified Blockchain Solutions Architect


Certified Blockchain Solutions Architect, Singapore elarning online course

Course Description

Welcome to the Certified Blockchain Solutions Architect (CBSA) LiveLessons Course. This course is ideal for technology-focused engineers, application developers, IT administrators, or anyone wanting to obtain the Blockchain Training Alliance Certified Blockchain Solutions Architect Certifications.
In this course, we will provide an exam overview of the Blockchain Training Alliance Certification, Certified Blockchain Solutions Architect (CBSA). This will include Blockchain basics such as components, terminology, and ledgers, as well as why Blockchain is revolutionizing how businesses and governments are looking at technology to create efficiencies. We will cover the top ten areas to focus on for the exam and what topics to study, as well as the exam process and what to expect before, during, and after the exam.


Course Objectives

• Examination Overview of Blockchain Training Alliance Certification, Certified Blockchain Solutions Architect (CBSA)
- Learn about the basics of Blockchain e.g. components, terminology, and ledgers 
- Learn about why Blockchain is revolutionizing how businesses and governments are looking at technology to create efficiencies
- Top 10 areas to focus on for the examination
- What are the topics to study for the examination?
- How is the examination process like?
- What to expect, before, during, and after the examination?


Related Courses

  • Certified Advanced Persistent Threat Analyst

    Certified Advanced Persistent Threat Analyst

    SGD $299.00

    Course Description

    Cyber-attacks have become so sophisticated over the years, that a new term has emerged - Advanced Persistent Threat, which we will refer to as APT. An APT is a group of individuals that have both the means and the intent to launch persistent attacks against specific targets. Understanding these groups and their behavior is important when evaluating threats against any organization.   Hackers have traditionally targeted large corporations, but today small to midsize businesses are being attacked with the same type of highly sophisticated malware. These new strains of advanced malware are often referred to as APTs   Modern malware uses Advanced techniques such as encrypted communication channels, kernel-level rootkits, and sophisticated evasion capabilities to get past a network’s defenses. More importantly, they often leverage zero day vulnerabilities – flaws for which no patch is available yet and no signature has been written.   Modern malware is often Persistent and designed to stick around. It’s stealthy and carefully hides its communications. It lives in a victim’s network for as long as possible, often cleaning up after itself by deleting logs, using strong encryption, and only reporting back to its controller in small, obfuscated bursts of communication.   Many attacks are now blended combinations of different techniques. A common tactic for hackers is to initiate an APT with spear phishing. This involves sending a carefully crafted email that appears to be in the from of a known individual or business with a link to a malicious website or an infected download.    Once the initial breach is successful, attackers can further damage defenses by disabling security protocols, changing security settings or stealing passwords. Groups of highly skilled, motivated, and very well-funded attackers represent significant Threats because they have very specific targets and goals in mind – often financial gain from theft of credit cards and other valuable account information.   Here are the topics that we will be covering in this course. We will begin by going over the APT Lifecycle and teach you a structured approach to analyze and assess inherent vulnerabilities. We will teach you mitigation and countermeasures that may prevent an attacker from gaining a foothold into an organization.   Next, we will get you familiar with APT1 Group and some common ATPs we have seen in the last few years like Stuxnet, and two new ones, Adwind and Poseidon. Lastly, we will get you familiar with the Cyber World War.

    Read more...

  • Security+ Certification Prep

    Security+ Certification Prep

    SGD $299.00

    Course Description

    Security+ Certification Prep The Security+ Certification Prep Course readies students for CompTIA's S+ certification exam which is globally recognized for validating foundational, vendor-neutral IT security knowledge and skills. With top experts and an interactive, lab-filled enviornment, students gain essential knowledge of the principals for network security and risk management with competency in organizational security, system security, access control and network infrastructure. The S+ certification by CompTIA is an internationally recognized credential ensuring ground-level security proficiency as well as skills for organization and security professionals to provide information, infrastructure, application and operational security. This course prepares the student for the CompTIA S+ Certification Exam SYO-401.

    Read more...

  • Google Cloud Platform for AWS Professionals & GCP Security Fundamentals

    Google Cloud Platform for AWS Professionals & GCP Security Fundamentals

    SGD $20.00

    Course Description

    AWS Professionals. This course is meant for IT professionals that are knowledgeable in AWS and are looking to get a quick ramp up in comparing Google Cloud Platform to Amazon Web Services at a functional level. This course covers most of the services. The Services covered are. 1)  Networking   2)  Storage   3)  Data Services   4)  Management Security in the cloud is much like security in your on-premise data centers, only without the costs of maintaining facilities and hardware. In the cloud, security is generally a shared responsibility between the provider and the customer. With Google Cloud Platform there are many facets of maintaining a secure cloud environment and in this course we will cover them.  

    Read more...


Content

Certified Blockchain Solutions Architect(CBSA)

+
Course Trailer

1 Course and Instructor Intro

2 What is a CBSA

3 Exam Questions

4 Objectives

5 Pretest

6 Blockchain all or Nothing

Blockchain 101 - Terminology and Components

7 Blockchain Terminology

8 Blockchain Components

Objective - The difference between proof of work, proof of stake, and other proof systems and why they exist

9 Difference between Consensus and why they exist

"Objective - Why cryptocurrency is needed on certain types of blockchains"

10 Cryptocurrency Needed or not?

Objective - The difference between public, private, and permissioned blockchains

11 Difference Between public, private or permissioned

Objective – How Blocks are written to a blockchain

12 How blocks are written to blockchain

13 Demo Block Activity

Objective – Where cryptography fits into blockchain and the most commonly used systems

14 Cryptography fits into blockchain

15 Demo - LTC Wallet

Objective – Database or Blockchain

16 Database or Blockchain?

Objective – The common use cases for public blockchains

17 Commom Use Cases for public blockchains

Objective – Common use cases for private & permissioned blockchains

18 Common Use Cases for private blockchains

Objective - What is needed to launch your own blockchain

19 Launching your blockchain

Objective – Segwits and Forks

20 Segwits and Forks

Objective – When is mining needed and when it is not

21 Mining Requirements

22 Genesis Mining

Objective – Byzantine Fault Tolerance

23 Byzantine Fault Tolerance

Objective – Consensus among Blockchains

24 Consensus

Objective – Hashing

25 Hashing Overview

26 Demo - Anders Hashing Demo

Objective – Security in Blockchain and how addresses, public keys, and private keys work

27 Security in Blockchains

Objective – What is a smart contract and dApps?

28 Smart Contracts and Dapps

Objective – History of Blockchain

29 History of Blockchain

Objective – The programming languages of the most common blockchains

30 Blockchain Programming

Objective – Common testing and deployment practices for blockchains and blockchain-based apps

31 Deploy and Test Apps

32 Demo Metamask

Objective – Value Creation

33 Value Creation

Objective – Blockchain Key Components

34 Key Components

Objective – Blockchain Architecture

35 Blockchain Architecture

36 Enterprise Blockchains

Objective – Bitcoin Improvement Protocols

37 Bitcoin Improvement Protocols (BIP)

Objectives – Hyperledger

38 Hyperledger Project

39 Hyperledger Fabric

40 Demo - IBM Blockchain as a Service

Objective – Hyperledger Composer

41 Hyperledger Composer

42 Demo - Hyperledger Composer Playground

43 Hyperledger Composer Playground

Objective - Hyperledger Chaincode

44 Hyperledger Chaincode

45 Whiteboard - Hyperledger Fabric

46 Hyperledger Wiki

Objective - Ethereum

47 Ethereum Overview

48 Ethereum EVM

49 Ethereum Browsers

50 Ethereum Development

51 Demo - Etherscan

52 Demo - Ethernodes

Course Wrapup

53 Blockchain Terminology Review

54 Taking the CBSA Exam

55 Discount Code Demo

56 Blockchain Roles

57 Bonus -Corda Whiteboard

58 Bonus -Corda DemoBench

59 Bonus - Ethereum Security

60 Bonus - Ether Gas

61 Bonus - BTC Explorer

SGD $29.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.