Course Outline
- Understand concepts of the blockchain
- Understand concepts of crypto currencies
- Know the importance of crypto currencies in our future
- understand what is the profit through mining crypto currencies
- How the mining crypto currencies happen?
- Learn how it's possible to make large profits by trading cryptocurrencies
- Have an overview of the most important crypto currencies
- Understand the opportunities of the blockchain technology
Requirements
Basic understanding of computers and the internet.
Testimonials (10)
Me gustó ver desarrollo seguro en ASP.NEt pero hicieron falta ejercicios práticos para implementar en el dia a dia de los desarrolladores
Alma Xocua - PASE, Servicios Electrónicos S.A. de C.V.
Course - Comprehensive C# and .NET Application Security
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
the balance between lectures and practice, the rhythm, the trainer knowledge and pedagogic skill
Armando Pinto - EID
Course - C/C++ Secure Coding
Very good knowledge and character.
Constantinos Michael
Course - Java and Web Application Security
Pushing changes on an ongoing basis, when on the 3rd day I started to get more lost than before and it was harder to spot the error quickly, I was quickly able to check out the latest changes and stay up to date with the material
Paulina
Course - Advanced Java Security
Machine Translated
Very good to understand how a hacker would potentially analyse sites for weakness and tools they might employ .