- Duration: 10 weeks
Categories: Blockchain
1. Setting Up Fabric
2. Docker Basics
- Lab: Installing HLF & setting up
3. Hyperledger Fabric Architect’s Use Cases
4. Architecting a solution/Architects Considerations
5. Database Administration in Fabric
6. Fabric Network Topology
- Lab: Bootstrapping the Network
- Lab: Building the Network Artifacts and basis
- Lab: Building the Network
7. System Administrator’s Chaincode Process
- Lab: Chaincode on Network
8.Communication on the Network
- Lab: Creating and Implementing New Organizations
9. Ordering Services
- Lab: Scaling the network & Modularity
10. Permissioning (Membership,ACL’s, Channels)
- Lab: Creating the Channels, and implementing Permissions
- Lab: Adding Pearson Vue
- Lab: MSP/CA Operations
11. Deployment Tips
Related Courses
IOTBT – IoT and Blockchain Training
What is IoT? Internet of Things Overview IoT History How does IoT work? Components of an IoT device Current IoT Landscape Growth areas: Privacy concerns IoT Design Standards Zigbee networking protocol Thread Group AllSeen Alliance/AllJoyn Open Interconnect Consortium/IoTivity Industrial Internet Consortium ITU-T SG20 IEEE P2413 Apple HomeKit IoT Design Questions…
0
BHP – Blockchain for Healthcare Professionals
Day 1 Blockchain 101 History of blockchain Decentralization/centralization Distributed ledger-private vs public Mining and consensus mechanisms Dapps and Smart Contracts Intro to healthcare on blockchain including Medical records FHIR, HL7 Day 2 Patient identity HIPAA and GDPR Value-based care and concepts (discuss outcome-based smart contracts) IoT, IoHT and Healthcare Digital…
0
CDLA – Corda Distributed Ledger Architecture
Chapter 1: Getting Started with R3 Corda Introduction Java, Kotlin, and IntelliJ Backgrounder Java Learning Resources Kotlin Learning Resources IntelliJ Learning Resources Financial Backgrounder Cryptography Basics Cryptographic PRNG Algorithms Cryptographic Hash Algorithms Symmetric Cryptographic Algorithms Asymmetric Cryptographic Algorithms Digital Signature Algorithms PKI, SSL/TLS and X.509 Authentication and Authorization Firewalls and…
0
DHF – Developing on Hyperledger Fabric 1.4
1. Blockchain Basics (Overview) 2. Hyperledger Fabric Development Environment Lab: Setting up the Developer Environment 3. Knowing the Difference: Composer 4. Chaincode Use Cases 5. Chaincode Basics Lab: Writing the Chaincode Structure 6. Golang Shim Development 7. Databases for the Developer Lab: Creating Rich Queries 8. Chaincode Dev. Deployment and…
0
DATASCIENCE-BLOCKCHAIN – Data Science and Blockchain Training (DataScience-BlockChain)
1. How we got to now: the digital data transformation The origin of data-driven approaches in government, academia and business Progress in data factor markets – Data connectivity – Data storage -Data processing Quantification of everything – IoT – Smart Cities -Wearables A brave new world of perfect information 2.…
0
IOTBT – IoT and Blockchain Training
What is IoT? Internet of Things Overview IoT History How does IoT work? Components of an IoT device Current IoT Landscape Growth areas: Privacy concerns IoT Design Standards Zigbee networking protocol Thread Group AllSeen Alliance/AllJoyn Open Interconnect Consortium/IoTivity Industrial Internet Consortium ITU-T SG20 IEEE P2413 Apple HomeKit IoT Design Questions…
0
BHP – Blockchain for Healthcare Professionals
Day 1 Blockchain 101 History of blockchain Decentralization/centralization Distributed ledger-private vs public Mining and consensus mechanisms Dapps and Smart Contracts Intro to healthcare on blockchain including Medical records FHIR, HL7 Day 2 Patient identity HIPAA and GDPR Value-based care and concepts (discuss outcome-based smart contracts) IoT, IoHT and Healthcare Digital…
0
CDLA – Corda Distributed Ledger Architecture
Chapter 1: Getting Started with R3 Corda Introduction Java, Kotlin, and IntelliJ Backgrounder Java Learning Resources Kotlin Learning Resources IntelliJ Learning Resources Financial Backgrounder Cryptography Basics Cryptographic PRNG Algorithms Cryptographic Hash Algorithms Symmetric Cryptographic Algorithms Asymmetric Cryptographic Algorithms Digital Signature Algorithms PKI, SSL/TLS and X.509 Authentication and Authorization Firewalls and…
0
DHF – Developing on Hyperledger Fabric 1.4
1. Blockchain Basics (Overview) 2. Hyperledger Fabric Development Environment Lab: Setting up the Developer Environment 3. Knowing the Difference: Composer 4. Chaincode Use Cases 5. Chaincode Basics Lab: Writing the Chaincode Structure 6. Golang Shim Development 7. Databases for the Developer Lab: Creating Rich Queries 8. Chaincode Dev. Deployment and…
0
DATASCIENCE-BLOCKCHAIN – Data Science and Blockchain Training (DataScience-BlockChain)
1. How we got to now: the digital data transformation The origin of data-driven approaches in government, academia and business Progress in data factor markets – Data connectivity – Data storage -Data processing Quantification of everything – IoT – Smart Cities -Wearables A brave new world of perfect information 2.…
0
IOTBT – IoT and Blockchain Training
What is IoT? Internet of Things Overview IoT History How does IoT work? Components of an IoT device Current IoT Landscape Growth areas: Privacy concerns IoT Design Standards Zigbee networking protocol Thread Group AllSeen Alliance/AllJoyn Open Interconnect Consortium/IoTivity Industrial Internet Consortium ITU-T SG20 IEEE P2413 Apple HomeKit IoT Design Questions…
0
BHP – Blockchain for Healthcare Professionals
Day 1 Blockchain 101 History of blockchain Decentralization/centralization Distributed ledger-private vs public Mining and consensus mechanisms Dapps and Smart Contracts Intro to healthcare on blockchain including Medical records FHIR, HL7 Day 2 Patient identity HIPAA and GDPR Value-based care and concepts (discuss outcome-based smart contracts) IoT, IoHT and Healthcare Digital…
0
CDLA – Corda Distributed Ledger Architecture
Chapter 1: Getting Started with R3 Corda Introduction Java, Kotlin, and IntelliJ Backgrounder Java Learning Resources Kotlin Learning Resources IntelliJ Learning Resources Financial Backgrounder Cryptography Basics Cryptographic PRNG Algorithms Cryptographic Hash Algorithms Symmetric Cryptographic Algorithms Asymmetric Cryptographic Algorithms Digital Signature Algorithms PKI, SSL/TLS and X.509 Authentication and Authorization Firewalls and…
0
prev
next
Leave feedback about this
You must be logged in to post a comment.