OBJECTIVES

Can a technology increase the quality of life of an ecosystem and a community by publicly highlighting the ethical and responsible behavior of companies, individuals, communities and territories?
The revolutionary and innovative Blockchain technology seems to be able to give a positive answer to this question.

This course illustrates the technical characteristics of the blockchain and offers a look at its possible and countless applications, also in the financial and insurance fields.

DURATION

1 30 hours and minutes

 

CONTENTS

Module 1 - An innovative technology

  • Introduction
  • A revolution called Blockchain
  • The Blockchain: a blackboard painted in the sky
  • "Trust" as a pillar of a new paradigm
  • Credit, believe, trust… even in algorithms
  • Algorithms are the law on which trust rests
  • Blockchain technology as a «Trust Machine».
  • From the «Trust Machine» to the Assumption of Responsibility

 

Module 2 - The Blockchain and Distributed Ledger Technology (DLT)

  • From centralized ledgers to the distributed ledger revolution
  • The Blockchain is a Distributed Ledger Technology (DLT)
  • The definition of DLT according to the Regulation
  • A comparison between Blockchain (DLT) and centralized database

 

Module 3 - The Blockchain: paradigm and definitions

  • The definition of Blockchain
  • Some terms at the base of the Blockchain
  • How the Blockchain works
  • How the Blockchain works: the focus on "mining"
  • The characteristics of the Blockchain

 

Module 4 - Cryptography at the basis of traceability, authenticity and integrity

  • Encryption to ensure integrity and authenticity
  • Symmetric and asymmetric cryptography
  • Asymmetric cryptography: public and private key
  • Asymmetric cryptography as a guarantee tool

 

Module 5 - Cryptography: hash and falsification of transactions

  • The hash function to authenticate a "summary"
  • Hash: definition and properties
  • Hash: characteristics
  • Hash: an example
  • Hash: some applications
  • What does "hashare" a transaction mean
  • What if someone wants to change the content of the transaction?
  • LEARNING STOP

 

Module 6 - The problem of consent: the validation of the block or "Mining"

  • The consensus problem in a DLT and the mining solution
  • The validation of the block or mining
  • What happens before mining validation
  • The meaning of mining
  • Mining and the criticality of electricity consumption

 

Module 7 - Distributed Consent: Let's Play Proof of Work (PoW)

  • What are the consent algorithms
  • Proof of Work: the consensus algorithm
  • Proof of Work: speed and difficulty
  • Proof of Work: What Games Can We Play?
  • Proof of Work: how it is implemented in blockchain
  • Proof of Work: strengths and weaknesses
  • Proof of Stake: an alternative to PoW
  • PoW vs PoS

 

Module 8 - Attacks on the Blockchain: "Double spending" and the "51% attack"

  • The problem of double spending
  • Double spending and Blockchain
  • Double spending: an example of a Blockchain solution
  • Attack at 51%
  • The 51% attack is not profitable

 

Module 9 - Bitcoin and Ethereum: technical aspects of cryptocurrencies

  • The definition of Bitcoin and bitcoin
  • "Historical" notes on bitcoin
  • Bitcoin: scarce like gold
  • Bitcoin and its "pseudo-anonymity"
  • Bitcoin: mining and 10 minutes
  • The limit of not being iterative of Bitcoin
  • Ethereum is programmable
  • The Ethereum GAS
  • The GAS LIMIT and the GAS PRICE of Ethereum
  • The reward of the miners in Ethereum
  • LEARNING STOP

 

Module 10 - Smart Contract as a key factor in enabling DLT

  • Smart contracts as a factor enabled by DLT
  • What are smart contracts
  • Smart contract: IF… THEN… AUTOMATICALLY
  • Smart contracts and oracles
  • Smart contracts and related benefits

 

Module 11 - The phenomenon of Initial Coin Offerings (ICO)

  • ICO: a definition
  • ICO: how it is structured
  • ICO: utility vs equity token

 

Module 12 - Applications

  • The added value of the blockchain by 2030
  • The 5 top blockchain drivers and their value by 2030
  • Blockchain: permissioned and permissionless
  • Applications
  • Applications: an example in the FINTECH field
  • Applications: an example in the INSURTECH field
  • Conclusion

 

FINAL TEST

 

TECHNICAL REQUIREMENTS:

 

Acrobat Reader

PDF documents are exported from version 5 and are compatible with all subsequent versions of Acrobat Reader released up to the update date of this file.

Browser

  • Internet Explorer 10
  • Internet Explorer 11
  • Mozilla Firefox
  • Google Chrome

JavaScript enabled

Pop-up blocker disabled

Minimum video resolution

The courses are optimized for a 1024 × 768 display on PCs and tablets of at least 7 inches.

Speakers or headphones (in case of multimedia products)

DATA TRACKING METHOD: SCORM 1.2

CERTIFICATION / CERTIFICATE

Final reports and certificate of use compliant with the provisions of the IVASS Regulation

DEVELOPMENT TECHNOLOGY:

HTML5

PRODUCED BY:

COPERNIC SQUARE

Content edited by: LYVE

Teacher: Federico Mobrici

COURSE CODE:

0008-21-02