Blockchain Overview-Blockchain Overview
Course Introduction
()
Blockchain Overview
()
Types of Blockchains
()
Uses of Blockchains
()
Blockchain Overview-Blockchain Applications
What Blockchains Can Do
()
Targets for Disruption
()
Applications
()
Blockchain Overview-Tech Big Picture
Blockchain Ingredients
()
Contextualizing Blockchain in Tech
()
Key Takeaways
()
Cryptographic Hashing-Overview of Cryptographic Hashing
Properties of a Hashing Algorithm
()
Applications of Hashes
()
Cryptographic Hashing-Math of Hashing
Modular Arithmetic
()
XOR
()
Cryptographic Hashing-SHA
SHA Overview
()
SHA-256
()
Scale of SHA-256
()
Information Loss in SHA-256
()
Brute Forcing a SHA-256
()
Applications of SHA-256
()
Blockchain Encryption and Signatures-Symmetric Ciphers
Monoalphabetic Ciphers
()
Polyalphabetic Ciphers
()
Blockchain Encryption and Signatures-Symmetric Digital Signatures
Symmetric Digital Signatures
()
Blockchain Encryption and Signatures-Asymmetric Digital Signatures
RSA
()
ECC
()
ECDSA
()
Quantum Signatures
()
Bitcoin and Other Blockchains-Bitcoin
The Original Blockchain
()
Hashing in the Bitcoin Blockchain
()
Mining
()
Bitcoin and Other Blockchains-Cryptocurrencies
Crypto Classifications
()
The Crypto Vision
()
Bitcoin and Other Blockchains-Ethereum
Ethereum Overview
()
Ethereum Under the Hood
()
The DAO
()
Bitcoin and Other Blockchains-Private Blockchains
Private Blockchains
()
Using Blockchain-Addresses
Addresses
()
Using Blockchain-Cryptotransactions
Bitcoin Transactions
()
Cryptotransactions In Depth
()
Cryptotransaction Mechanics
()
Using Blockchain-Scalability
Layer 2
()
Using Blockchain-Machine to Machine
Machine to Machine
()
Consensus-Consensus Overview
Intro to Consensus
()
Nodes
()
Consensus-Public Consensus Algorithms
Proof of Work
()
Efficient Hashing for Proof of Work
()
Proof of Stake
()
Consensus-Private Consensus Algorithms
Byzantine Fault Tolerance
()
Consensus-Other Consensus Algorithms
Other Consensus Algorithms
()
Value of Cryptoapplications-Money and Crypto
Money and Crypto
()
Value of Cryptoapplications-Stablecoins
Stablecoins
()
Crypto Collateralized Stablecoins
()
Non-Collateralized Stablecoins
()
Value of Cryptoapplications-Initial Coin Offerings (ICOs)
Initial Coin Offerings
()
ICO Trends
()
Value of Cryptoapplications-Fraudulent Crypto
Fraudulent Crypto1
()
Fraudulent Crypto2
()
Value of Cryptoapplications-Evaluating ICOs
ICO Checklist
()
The Regulatory Environment and the Future of Fintech-Introduction to Regulation. The Role of the SEC.
Introduction to Regulation. The Role of the SEC.
()
The Regulatory Environment and the Future of Fintech-The Role of the CFTC, IRS, and Other Agencies
The Role of the CFTC, IRS, and Other Agencies
()
The Regulatory Environment and the Future of Fintech-The Transmission of Money
The Transmission of Money
()
The Regulatory Environment and the Future of Fintech-The Fintech Landscape
What is Fintech?
()
What Accounts for the Growth in Fintech?
()
What are the Implications for Business?
()
What are the Implications for Society?
()
Fintech Promise for the Unbanked
()
What Fueled the Growth of AI and Machine Learning?
()