Introduction to Blockchain as a cyber security tool

Introduction to Blockchain as a cyber security tool
This training introduces, within the framework of cyber security, the new Blockchain technology and offers a first approach to the characteristics, virtues and limitations of this technology, as well as the different types of existing implementations.
Specific goals | Temary
OBJECTIVES
- Understand the origin of Blockchain technology.
- Learn the basic components and functioning of this technology.
- Identify the different types of Blockchain.
- Understand what Smart Contracts are and their potential applications.
- Learn about asset tokenization.
SYLLABUS
- Introduction
- Origin of the technology and its properties.
- Components of a Blockchain and how it works.
- Blockchain Technology
- Types of existing Blockchains.
- Consensus algorithms.
- What are Smart Contracts?
- Asset Tokenization
- What is tokenization?
- Cryptocurrencies.
- NFTs.
- Examples of tokenization.
- Use Cases of the Technology
Editions
General information
>> In case the format is virtual via streaming, it will be carried out through the free platform Microsoft Teams. Registered individuals will receive the invitation link and access instructions by email before the session starts.
>> Entry to the classroom will not be allowed after 15 minutes once the activity has started.
>> The language in which each session is conducted is informed in the description of each activity.
>> Any of the training actions of Cibernàrium may be recorded through an image capture system that aims to subsequently disseminate them through a medium or support within the scope of the mission of Barcelona Activa to contribute to economic promotion and employment. In the recording process, images of attendees may eventually be recorded. Registration for Cibernàrium activities implies authorization for Barcelona Activa to use these images for the aforementioned purpose.
Course ratings
Trainer's person
VILA CANO
Personal Data Protection Law
There is a new version of Personal Information Protection law.
Please, accept it before continuing the registration.