Cryptocurrencies and Other Digital Assets

User Avatar

Cryptocurrencies and Other Digital Assets

1 day
All levels
10 lessons
0 quizzes
1 student

Overview:

There have been many attempts to create digital money in the past, but they have always failed with trust being the prevailing issue. Here comes Cryptocurrencies, and the blockchain technology that drive them which makes it one of the most exciting developments in the world of digital payments. 

This learning programme provides a strong starting point for exploring the world of cryptocurrencies like Bitcoins, digital payments etc. 

 

Learning Outcome:

In this learning programme you will learn the basics of cryptocurrencies, from its origins and the blockchain technology behind it to the benefits and drawbacks of digital currencies as well as questions you should ask yourself if you are considering investing.

The main aim is to educate and create a sense of realism with respect to Cryptocurrencies, related applications, smart contracts and digital assets.

Participants will understand how Bitcoin and other cryptocurrency systems work, and how they challenge current financial systems. regulatory practices using real examples of how different industries are executing the technology and improving their business.

 

Course Outline:

  1. What are Cryptocurrencies and how is it an innovative and effective method of currency?
  2. Bitcoin, Ethereum etc
  3. What are Digital Assets?
  4. Global best practices using relatable use cases
  5.  Stable coins, tokenization, Smart contracts
  6. ICO’s vs IPO’s
  7. Wallets and Private Keys/Seed-phrases
  8. Crypto regulation, adoption & its challenges 
  9. Exchanges
  10. Do-it-yourself exercises:

               ○ Wallet Setup, Funding and making transactions

               ○ Account Opening on an Exchange, Funding and making transactions

Free

This course include

  • Language - English Language - English
  • Access on desktop, tablet and mobile Access on desktop, tablet and mobile
  • Full lifetime access Full lifetime access
  • Certificate of Completion Certificate of Completion

More courses you might like

Free
What you'll learn
  • In-depth analysis of Cybercrime, Online fraud, Digital piracy and regulation
  • Understanding the vital concepts like Confidentiality, data Integrity and Availability, what is a threat versus vulnerabilities, and pertinent statistics on current data security trends.
  • Elucidate on different industry standard IT risk assessment process and methodologies
  • Best practices for securing company information systems
  • Media Control – Storage state ( encrypted/not encrypted ) confidential/sensitive data
  • Email Security - double checking addresses, avoiding putting sensitive information in the body of emails but rather in an encrypted attachment
  • Physical security – policing work areas for sensitive info, shredding unneeded paper copies, being wary of shoulder surfing and tailgating in sensitive areas, printer security.
  • Overview of incident reporting policy & procedures that detail what to do if they believe a security incident has occurred, who to call, what to expect and what information to provide to responsible parties
  7 lessons
Free
What you'll learn
  • This learning programme introduces participants to the Big Data Canvas, a methodology for ensuring that data strategies remain feasible while pursuing the most valuable outcomes.
  • Recognize the dynamics of big data, analytics, and data science in various financial applications.
  • Identify the Critical Success Factors for an organization’s Big Data strategy
  •  Shape your organization’s big data strategy by leveraging data science best practices.
  • Gain understanding of business analytics with the use of robust data and the ability to consider the relationships between this data science and finance to make holistic judgments when analyzing situations.
  • Apply ethical practices in everyday business activities and make well-reasoned ethical business and data management decisions. Select, Prepare, Construct, and Integrate, Structure, and Format data to be most effective to ensure the models meet the business goals.
  • Develop actionable plans from existing data and initiatives to increase sales, reduce marketing costs and improve customer retention.
  • Demonstrate knowledge of statistical data analysis techniques utilized in business decision making.
  • Manage data efficiently and allow users to perform multiple tasks with ease.
  23 lessons
Free
What you'll learn
By taking this focus course, attended candidates are expected to be familiar with the following concepts: Blockchain Basic
  • Permissioned and distributed ledger
  • Public, private and side chain
  • Tokenized and token-less blockchain
  • Types of blockchain technology
  Properties of Blockchain
  • Decentralization
  • Transparency
  • Immutability
  • Availability
  • Secure
  • Uniqueness
  Concepts of Blockchain
  • Transaction life-cycle
  • Commonly used opcodes
  • UTXO
  • Transaction fee
  • Transaction pool
  • Transaction verification
  Crypto Primitives
  • Cryptographic hash function
  • Hash pointer and Merkle tree
  • Block P2P network
  • CAP theorem
  • Types of consensus
  • Genesis Block
  • Digital Signature
  • Public Key Cryptography
  • A basic cryptocurrency
  • Name Coin
  • Zcash
Bitcoin Basics
  • Creation of coins, native coins
  • Payments and double spending
  • FORTH-the precursor for Bitcoin scripting
  • Symmetric cryptography
  • Elliptical curves
  • Hashes SHA 256
  • Message digest
  • Proof of Work
  • Permissioned Blockchain
  • Actors in a Blockchain
  • Blockchain ledger
  25 lessons
  20 students
Free
What you'll learn
  • Discover the drivers of Fintech such as artificial intelligence, Big data and how they can be leveraged to improve customer service, make data driven decisions, and explore risk and reward.
  • You'll gain a foundational understanding of what exactly Fintech encompasses and how it is changing the world we live in. 3. Appraise fintech challenges and rapid response strategies.
  • Solve problems arising from digital disruptive technologies.
  • The frameworks for investing in disruptive innovative technologies.
  • Discover and understand the various types of technologies that are used both by startups and established financial institutions to make financial services more accessible to all.
  • Measure digital customer experience
  • To equip learners with the right set of skills and knowledge in Fintech
  • Understand the tools and processes that uncover value from data.
  • Learn cutting edge insights on how to manage financial innovations disruptors within a competitive landscape.
  • The dynamics of Fintech and how it is transforming the world of finance.
  8 lessons

Introduction to Cybersecurity

User Avatar

Introduction to Cybersecurity

1 day
All levels
7 lessons
0 quizzes
2 students

Overview

The training begins by giving a broad overview of information before narrowing it down to specific assessment details as it applies to your unique business environment. The proposed outcome of the training is to bring staff up to date with the latest information security practices required by regulatory bodies and the law, and the latest security threats affecting businesses worldwide and how to mitigate against them.

The training will also introduce the possibility of setting up an Information Security program in your organization to foster information security awareness and improve the overall risk profile of the organization taking into view various business processes carried out by the organization. It will also empower your staff with the knowledge and tools deployed to measure and assess organizational, technical and procedural risks.

 

Training Objectives

  1. In-depth analysis of Cybercrime, Online fraud, Digital piracy and regulation
  2. Understanding the vital concepts like Confidentiality, data Integrity and Availability, what is a threat versus vulnerabilities, and pertinent statistics on current data security trends.
  3. Elucidate on different industry standard IT risk assessment process and methodologies
  4. Best practices for securing company information systems
  5. Media Control – Storage state ( encrypted/not encrypted ) confidential/sensitive data
  6. Email Security – double checking addresses, avoiding putting sensitive information in the body of emails but rather in an encrypted attachment
  7. Physical security – policing work areas for sensitive info, shredding unneeded paper copies, being wary of shoulder surfing and tailgating in sensitive areas, printer security.
  8. Overview of incident reporting policy & procedures that detail what to do if they believe a security incident has occurred, who to call, what to expect and what information to provide to responsible parties

 

Modules:

  1. Introduction to Cybersecurity
  2. Embedding cybersecurity into your structures and objectives
  3. Growing cybersecurity practices, trends and use cases.
  4. Mastering an innovative cybersecurity culture
  5. Understanding cybersecurity threats and responses
  6. Risk Management for Cybersecurity and implementing effective measures.
  7. Social Engineering and its management
Free

This course include

  • Language - English Language - English
  • Access on desktop, tablet and mobile Access on desktop, tablet and mobile
  • Full lifetime access Full lifetime access
  • Certificate of Completion Certificate of Completion

WordPress › Error

There has been a critical error on this website.

Learn more about troubleshooting WordPress.