Obligation of Care An obligation of care is the duty to guarantee the wellbeing, security and general prosperity of others. It can incorporate contribution useful input and safe working conditions for representatives. The UK has a legitimate commitment for obligation of care. Individuals are required to think often about the wellbeing and security of individuals around them. With such arrangements set up, working conditions in the UK are regularly ok for representatives. This is not normal for working environment conditions in non-industrial nations, as they don't have a lawful commitment for obligation of care. Managers should initially meet legitimate commitments to have the option to offer a high level obligation of care to their representatives. They ought to likewise figure out what their laborers need and the obligation of care that is as of now set up to help think of new obligation of care standards. Because of the embodiment of individuals' security grinding away or elsewhere, this course has been created to assist you with understanding the term 'obligation of care' from an overall perspective, for simplicity of utilization in any industry. We start by characterizing obligation of care and what it by and large includes. Then, we list the advantages of obligation of care to representatives and clarify whether it is a legitimate prerequisite in the UK. At long last, the course covers levels of obligation of care and how businesses can build up an obligation of care strategy. You Will Learn: The importance of obligation of care The advantages of obligation of care The legitimateness of obligation of care Obligation of care levels Step by step instructions to build up an obligation of care strategy Advantages of Taking This Course: Taking this course will help you: Comprehend obligation of care and its substance in the work environment or elsewhere where it's pertinent Know the advantages of obligation of care to workers Decide whether you need obligation of care Decide whether you have obligation of care set up Decide whether you have an obligation of care to solitary specialists and individuals with incapacities Build up a powerful obligation of care for your work space
Significance of Good Housekeeping at Work Certification Everybody is by all accounts mindful of their commitment to keep a working environment clean. This is the reason organization proprietors regularly employ experts to scour workplaces around evening time or go through intermittent closures. In any case, great housekeeping at work requires significantly more than essentially utilizing cleaning items. It likewise implies keeping your own workspace liberated from hindrances and garbage that could cause trips or different risks. Rehearsing great housekeeping at work guarantees that the work environment is more secure and as liberated from wounds as could be expected. This course expounds on the significance of rehearsing great housekeeping at work, while likewise giving you directions on the best way to do as such. We start by evaluating what helpless housekeeping is, just as featuring the dangers implied with working in that sort of climate. We additionally audit the critical advantages of utilizing great housekeeping systems at work. Then, we examine why you need to build up a housekeeping program paying little heed to your industry. At long last, we survey why you need to assess your housekeeping endeavors on a progressing premise. You Will Learn: How helpless housekeeping places you and others in your working environment in danger Instances of helpless housekeeping, including normal errors made by numerous organizations How utilizing great housekeeping abilities can build profitability and diminish the quantity of days off taken The things that numerous individuals ignore when building up a housekeeping program The means you can take to guarantee that your working environment stays clean Advantages of Taking This Course Having the option to appreciate a more secure working environment, as liberated from risks as is feasible for your industry Understanding the job representatives play in keeping zones perfect, flawless and liberated from trash Figuring out how to stay away from normal mix-ups made when executing housekeeping strategies Understanding that great housekeeping is a continuous assignment, not something that you just need to stress over once Figuring out how to urge your representatives to keep their space perfect and liberated from flotsam and jetsam
Is the Customer Always Right? While clients are without a doubt the main resource of any business, the inquiry remains if customers are in reality in every case right. Begat by Harrod Gordon in 1909, 'the client is in every case right' is an old and generally acknowledged saying in the realm of business. Notwithstanding, however urgent as consumer loyalty seems to be and however significant as clients may be to business achievement, there are times and circumstances where shoppers are not in every case right. Truth be told, aimlessly following the presumption that purchasers are in every case right can prompt unfavorable ramifications. The video seminar on 'Is the Consumer Always Right?' examines and discusses the two sides of the coin and assists you with settling on the most ideal approaches to determine circumstances at work. The course themes cover: Why clients are significant to the development and advancement of your business and how to treat your clients well The advantages of treating your clients with consideration and regard and how it makes a difference Figuring out how to recognize circumstances where the purchaser may not generally be correct and how to separate between the authenticity of the grievance and helpless client care The most effective method to gauge the advantages and disadvantages of the circumstance and incorporate significant contemplations How aimlessly preferring the purchaser can bring down the spirit of your workers Helpful systems and tips that you can utilize when you track down that a buyer isn't right The most effective method to decide whether you can resolve the circumstance or on the off chance that you should release the shopper Advantages of examining the course include: You will actually want to assess a circumstance by get-together subtleties You become mindful of the significance of clients and why you should offer solid client support You are better positioned to back up workers when a shopper is harmful or rough You figure out how to separate between strong clients who merit holding and others that you can give up You figure out how to oversee troublesome buyers and control your non-verbal communication in unpleasant circumstances
Positive Handling in Schools Certification Instructors and care staff in the present schools face a great deal of hostility from their understudies. These circumstances can be extremely hard to manage, particularly if the understudy is especially forceful or takes steps to make genuine damage the school, themselves, or others. To moderate these dangers, all schools are needed to give instructors and care staff preparing in sure dealing with to all the more likely assist them with understanding the utilization of power in schools. This course gives a thorough outline of how to participate in certain dealing with when the circumstance requires. It starts by discussing positive taking care of as a rule and going over the important enactment. It at that point really expounds on the public authority rules and exhortation on this matter. The modules likewise examine the animosity bend, giving instructors and care staff significant data about the best an ideal opportunity for mediation. At last, it gives you the devices you need to settle on choices about when you ought to genuinely intercede. You Will Learn:- Data about sure dealing with, remembering a definition and brief history of it for UK schools. The pertinent enactment directing the utilization of positive taking care of and actual intercession in schools. Rules gave by the public authority, offering more solace to instructors and staff about certain dealing with and mediating truly. The animosity bend, utilizing the Kaplan-Wheeler chart to represent each stage. What the SCARF model is and how you can utilize it to de-raise tense or forceful circumstances. Step by step instructions to settle on choices about when to mediate. Advantages of Taking This Course Becoming familiar with positive taking care of, including when it is suitable. Acquiring understanding into the significant enactment and officially sanctioned rules and counsel. Finding out about the animosity bend, including the best stages for intercession and the most dangerous ones. Understanding what the SCARF model is and how it tends to be utilized to deescalate a possibly forceful circumstance. Realizing when to utilize positive dealing with, actual mediation and actual restriction.
Teaching English as a Foreign Language (TEFL) Online Course Introduction Do you have a passion for the English language and enjoy sharing knowledge? A career in teaching may be ideal for you. Specifically, teaching English as a second language to both children and adults could be your niche. While a specialized degree in English is not mandatory for entering this field, it is recommended to have some formal training. This comprehensive course offers an overview of teaching English as a second language, with a focus on TEFL (Teaching English as a Foreign Language) training to broaden your career prospects. Starting with an exploration of common acronyms in the field, the course guides you through the essentials of teaching English to non-native speakers. Throughout the program, you will delve into various teaching methodologies and approaches applicable to ESL (English as a Second Language) classrooms. Topics covered include effective lesson planning, efficient classroom management techniques, and strategies for creating a dynamic and inclusive learning environment. The course aims to equip you with practical tools to make your lessons engaging and impactful for students of all ages. What you will learn: The importance of using authentic materials in your lessons and how to select the most relevant ones More about the three main methods used to teach English to non-native speakers What a learner-based approach to lesson planning is and why it is important The importance of context when introducing new words or concepts to students How to successfully introduce vocabulary words to students of all ages Benefits of taking TEFL Course: Learn about the difference between TESOL, TEFL and CELTA training Understand what kind of supportive materials you should incorporate into your lessons Learn more about what is involved in teaching English to foreign-language speakers, which can help guide career decisions for students uncertain about post-secondary training If you are a teacher, learn more about the strategies others recommend using when educating ESL students If you have an ESL student in your life, learn more about how they are learning English so you can help support them at home
Enroll in the online course "Photoshop & Illustrator CC: Become a Professional Logo Designer" and gain comprehensive knowledge of logo design workflow from beginning to end, complete with practical examples and step-by-step guidance. The course commences by providing a thorough understanding of logos, their functions, and significance. You will then examine some of the world's most recognizable logos and explore the best practices and latest trends in logo design. Additionally, crucial topics such as plagiarism and copyright will also be discussed. Subsequently, the course delves into the visual components of a logo and focuses on two critical elements: typography and color. Furthermore, the course will cover the fundamental graphics and logo design processes, leading to the most demanding stage: learning how to use Photoshop and Illustrator, and ultimately creating your first logo using both tools. Step-by-Step Secrets to Designing Great Logos Master the use of Adobe Photoshop and Illustrator for effective logo design Explore the function of logos and why some work better than others Discover the fundamental design principles behind great logos Learn how to land clients and understand what they want from a design Push your creative skills into an in-demand, specialized area Combine Technical Skills with Creative Principles The "Step-by-Step Secrets to Designing Great Logos" online course is tailored to individuals who wish to create effective logos, including designers, small business owners, art students, and prospective freelancers. This course does not require prior design experience, but it can be beneficial to have a basic understanding of Illustrator, Photoshop, and design principles. The course covers several important topics, including the importance and function of logos, fundamental design principles, client acquisition, and the use of Adobe Photoshop and Illustrator for logo design. By the end of the course, you will have a comprehensive understanding of the logo design workflow, complete with real-world examples and step-by-step instructions. Finally, you will have the opportunity to apply your skills and create your first logo using Adobe Photoshop and Illustrator. This online course is an excellent choice for those starting a business, studying design, or looking to improve their skills. Length of Study: 8 hours with 12 years of access to content
Duration 5 Days 30 CPD hours This course is intended for This course is for IT administrators who will be maintaining and installing software, taking inventory of computers, distributing software updates to computers or remotely managing computers. Overview Upon completion of this course, students will be able to: Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Gather hardware, software and operating system inventory from managed computers. Maintain a software catalog containing software components. Deliver software to managed computers. Meter software on managed computers. Distribute software updates to managed computers. Remotely manage computers. Analyze gathered data using predefined reports. This hands-on course teaches students the underlying components and concepts of the Symantec Management Platform along with the Symantec Management Console that is used by CMS to perform its management functions. Introduction Course overview The classroom lab environment Understanding the Symantec Client Management Suite Symantec Client Management Suite demonstration Learning about the Symantec Client Management Suite Symantec Management Platform components used by CMS Symantec Management Platform concepts used by CMS How the platform and CMS work The Symantec Management Console Accessing the Symantec Management Console Getting to know the Symantec Management Console Getting to know the enhanced console views Symantec Management Platform Basics Importing computer resources from Active Directory Discover computer resources using Network Discovery Grouping resources Applying CMS policies to resource targets Deploying the Symantec Management Agent Installing the Symantec Management Agent - push method Installing the Symantec Management Agent - pull method Installing solution plug-ins for the Symantec Management Agent Working with the Symantec Management Agent GUI Working with the Symantec Management Agent health settings Gathering Inventory from Managed Computers Introducing Inventory Solution Creating and configuring inventory policies Using inventory tasks Other Inventory Solution capabilities Introducing inventory reports Managing the Software Catalog Preparing the Software Management Framework to support the Software Catalog Populating the Software Catalog with software components Working with software component resources Creating and configuring software products Delivering Software to Managed Computers Choosing a method to deliver software Understanding the software blade of the enhanced console view Managing software deliveries with tasks Installing software using a managed software delivery policy Introducing software management reports Managing Software with Application Metering Understanding Application Metering Tracking software usage on managed computers Metering software with Application Metering policies Application metering reports Managing Organizational Views and Organizational Groups Learning about organizational views and groups Creating custom organizational views and group Managing organizational views and groups Managing Resource Filters and Resource Targets More about resource filters Managing and working with existing filters Creating and modifying filters More about resource targets Working with targets Managing Software Updates on Windows Computers Introducing Patch Management Solution for Windows Preparing your environment for Patch Management Distributing software updates Patch Management Solution reports Managing Virtualized Software Introducing Symantec Workspace Virtualization Installing the Symantec Workspace Virtualization agent Using CMS to deliver virtualized software Remotely Managing Computers Introducing Symantec Remote Access Connector Overview or Real-Time System Manger Remote management reports Managing Policies Getting to know policies Understanding user-based policies Understanding maintenance windows Configuring automation policies Managing shared schedules Managing Jobs and Tasks Overview of task management Creating and scheduling tasks and jobs Overview of Deployment Solution Introducing Deployment Solution Configuring Deployment Solution Creating and managing deployment jobs and tasks Deployment Solution imaging Reporting Introducing reports Using and creating standard reports Configuring and using IT Analytics Solution Site Management Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services Security Learning about security Managing user accounts, security roles, and privileges Managing permissions Additional course details: Nexus Humans Symantec Client Management Suite 7.6 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Client Management Suite 7.6 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This intermediate and beyond level course is geared for experienced technical professionals in various roles, such as developers, data analysts, data engineers, software engineers, and machine learning engineers who want to leverage Scala and Spark to tackle complex data challenges and develop scalable, high-performance applications across diverse domains. Practical programming experience is required to participate in the hands-on labs. Overview Working in a hands-on learning environment led by our expert instructor you'll: Develop a basic understanding of Scala and Apache Spark fundamentals, enabling you to confidently create scalable and high-performance applications. Learn how to process large datasets efficiently, helping you handle complex data challenges and make data-driven decisions. Gain hands-on experience with real-time data streaming, allowing you to manage and analyze data as it flows into your applications. Acquire practical knowledge of machine learning algorithms using Spark MLlib, empowering you to create intelligent applications and uncover hidden insights. Master graph processing with GraphX, enabling you to analyze and visualize complex relationships in your data. Discover generative AI technologies using GPT with Spark and Scala, opening up new possibilities for automating content generation and enhancing data analysis. Embark on a journey to master the world of big data with our immersive course on Scala and Spark! Mastering Scala with Apache Spark for the Modern Data Enterprise is a five day hands on course designed to provide you with the essential skills and tools to tackle complex data projects using Scala programming language and Apache Spark, a high-performance data processing engine. Mastering these technologies will enable you to perform a wide range of tasks, from data wrangling and analytics to machine learning and artificial intelligence, across various industries and applications.Guided by our expert instructor, you?ll explore the fundamentals of Scala programming and Apache Spark while gaining valuable hands-on experience with Spark programming, RDDs, DataFrames, Spark SQL, and data sources. You?ll also explore Spark Streaming, performance optimization techniques, and the integration of popular external libraries, tools, and cloud platforms like AWS, Azure, and GCP. Machine learning enthusiasts will delve into Spark MLlib, covering basics of machine learning algorithms, data preparation, feature extraction, and various techniques such as regression, classification, clustering, and recommendation systems. Introduction to Scala Brief history and motivation Differences between Scala and Java Basic Scala syntax and constructs Scala's functional programming features Introduction to Apache Spark Overview and history Spark components and architecture Spark ecosystem Comparing Spark with other big data frameworks Basics of Spark Programming SparkContext and SparkSession Resilient Distributed Datasets (RDDs) Transformations and Actions Working with DataFrames Spark SQL and Data Sources Spark SQL library and its advantages Structured and semi-structured data sources Reading and writing data in various formats (CSV, JSON, Parquet, Avro, etc.) Data manipulation using SQL queries Basic RDD Operations Creating and manipulating RDDs Common transformations and actions on RDDs Working with key-value data Basic DataFrame and Dataset Operations Creating and manipulating DataFrames and Datasets Column operations and functions Filtering, sorting, and aggregating data Introduction to Spark Streaming Overview of Spark Streaming Discretized Stream (DStream) operations Windowed operations and stateful processing Performance Optimization Basics Best practices for efficient Spark code Broadcast variables and accumulators Monitoring Spark applications Integrating External Libraries and Tools, Spark Streaming Using popular external libraries, such as Hadoop and HBase Integrating with cloud platforms: AWS, Azure, GCP Connecting to data storage systems: HDFS, S3, Cassandra, etc. Introduction to Machine Learning Basics Overview of machine learning Supervised and unsupervised learning Common algorithms and use cases Introduction to Spark MLlib Overview of Spark MLlib MLlib's algorithms and utilities Data preparation and feature extraction Linear Regression and Classification Linear regression algorithm Logistic regression for classification Model evaluation and performance metrics Clustering Algorithms Overview of clustering algorithms K-means clustering Model evaluation and performance metrics Collaborative Filtering and Recommendation Systems Overview of recommendation systems Collaborative filtering techniques Implementing recommendations with Spark MLlib Introduction to Graph Processing Overview of graph processing Use cases and applications of graph processing Graph representations and operations Introduction to Spark GraphX Overview of GraphX Creating and transforming graphs Graph algorithms in GraphX Big Data Innovation! Using GPT and Generative AI Technologies with Spark and Scala Overview of generative AI technologies Integrating GPT with Spark and Scala Practical applications and use cases Bonus Topics / Time Permitting Introduction to Spark NLP Overview of Spark NLP Preprocessing text data Text classification and sentiment analysis Putting It All Together Work on a capstone project that integrates multiple aspects of the course, including data processing, machine learning, graph processing, and generative AI technologies.
Duration 2 Days 12 CPD hours This course is intended for This class assumes some prior experience with Git, plus basic coding or programming knowledge. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert team, students will explore: Getting Started with Collaboration Understanding the GitHub Flow Branching with Git Local Git Configuration Working Locally with Git Collaborating on Your Code Merging Pull Requests Viewing Local Project History Streaming Your Workflow with Aliases Workflow Review Project: GitHub Games Resolving Merge Conflicts Working with Multiple Conflicts Searching for Events in Your Code Reverting Commits Helpful Git Commands Viewing Local Changes Creating a New Local Repository Fixing Commit Mistakes Rewriting History with Git Reset Merge Strategies: Rebase This is a fast-paced hands-on course that provides you with a solid overview of Git and GitHub, the web-based version control repository hosting service. While the examples in this class are related to computer code, GitHub can be used for other content. It offers the complete distributed version control and source code management (SCM) functionality of Git as well as adding its own features. It provides access control and several collaboration features such as bug tracking, feature requests, task management, and wikis for every project. Getting Started with The GitHub Ecosystem What is Git? Exploring a GitHub Repository Using GitHub Issues Activity: Creating A GitHub Issue Using Markdown Understanding the GitHub Flow The Essential GitHub Workflow Branching with Git Branching Defined Activity: Creating a Branch with GitHub Introduction Class Diagram Interaction Diagrams Sequence Diagrams Communication Diagrams State Machine Diagrams Activity Diagram Implementation Diagrams Local Git Configuration Checking your Git version Git Configuration Levels Viewing your configurations Configuring your username and email Configuring autocrif Working Locally with Git Creating a Local copy of the repo Our favorite Git command: git status Using Branches locally Switching branches Activity: Creating a New File The Two Stage Commit Collaborating on Your Code Collaboration Pushing your changes to GitHub Activity: Creating a Pull Request Exploring a Pull Request Activity: Code Review Merging Pull Requests Merge Explained Merging Your Pull Request Updating Your Local Repository Cleaning Up the Unneeded Branches Viewing Local Project History Using Git Log Streaming Your Workflow with Aliases Creating Custom Aliases Workflow Review Project: GitHub Games User Accounts vs. Organization Accounts Introduction to GitHub Pages What is a Fork? Creating a Fork Workflow Review: Updating the README.md Resolving Merge Conflicts Local Merge Conflicts Working with Multiple Conflicts Remote Merge Conflicts Exploring Searching for Events in Your Code What is GitHub? What is Git bisect? Finding the bug in your project Reverting Commits How Commits are made Safe operations Reverting Commits Helpful Git Commands Moving and Renaming Files with Git Staging Hunks of Changes Viewing Local Changes Comparing changes with the Repository Creating a New Local Repository Initializing a new local repository Fixing Commit Mistakes Revising your last commit Rewriting History with Git Reset Understanding reset Reset Modes Reset Soft Reset Mixed Reset Hard Does gone really mean gone? Getting it Back You just want that one commit Oops, I didn?t mean to reset Merge Strategies: Rebase About Git rebase Understanding Git Merge Strategies Creating a Linear History Additional course details: Nexus Humans Introduction to GITHub for Developers (TTDV7551) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to GITHub for Developers (TTDV7551) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network