Introduction to Blockchain as a cyber security tool
Introduction to Blockchain as a cyber security tool
This training introduces, within the framework of cyber security, the new Blockchain technology and offers a first approach to the characteristics, virtues and limitations of this technology, as well as the different types of existing implementations.
Specific goals | Temary
Know the origin of Blockchain technology.
Learn the basic components and how this technology works.
Identify the types of Blockchain that exist.
Know what Smart Contracts are and what possibilities they bring.
Learn about the tokenization of assets.
CONTENT
1. Introduction.
- Origin of the technology and its properties.
- Components of a Blockchain and how it works.
2. Blockchain technology
- Types of existing Blockchains.
- Consensus algorithms.
- What are Smart Contracts?
3. Tokenization of assets.
- What is tokenization?
- Cryptocurrencies.
- The NFTs.
- Examples of tokenization.
4. Technology use cases.
Editions
Tue 26/11/24 (16:00-18:00h)
Wed 27/11/24 (16:00-18:00h)
Virtual classroom
General information
IMPORTANT: In the event that the format is virtual streaming, it will be done through the free Microsoft Teams platform. Registrants will receive an invitation link and access instructions by email prior to the start of the session.
>> Entry to the classroom will not be allowed after 15 minutes, once the activity has started.
>> The language in which each session is given is reported in the description of each activity.
>> Any of Cibernàrium's training actions can be recorded through a system
of capturing images whose purpose is their subsequent dissemination through a medium or support
in the scope of Barcelona Activa's mission to contribute to economic promotion and employment.
In the recording process, images of the attendees may eventually be recorded
formation. Registration for Cibernàrium activities implies the authorization to Barcelona Activa of
make use of these images for the above purpose.
Course ratings
Lesson taught by
VILA CANO
Related courses
Personal Data Protection Law
There is a new version of Personal Information Protection law.
Please, accept it before continuing the registration.