Becoming a Hyperledger Aries Developer
About this Course
Data is driving our world today. However, we hear about data breaches and identity thefts all the time. Trust on the Internet is broken, and it needs to be fixed. As such, it is imperative that we adopt a new approach to identity management, and ensure data security and user privacy through tamper-proof transactions and infrastructures. Blockchain-based decentralized identity management is revolutionizing this space. The four Hyperledger open source Identity projects, Aries, Indy, AnonCreds, and Ursa, provide the foundation for guilding distributed applications using authentic data. Together, the projects include protocol specifications and open source tools, libraries, and reusable components for establishing secure, peer-to-peer messaging channels that can be used for issuing, holding, presenting, and verifying verifiable credentials. These capabilities enable the creation and use of independent digital identities rooted on blockchains or other distributed ledgers that are interoperable across administrative domains, applications, and any other data silo. While this course will mention Ursa and dive a bit into Indy and AnonCreds, its main focus is on Aries, and the possibilities Aries brings for building applications on a solid foundation of digital trust. This focus will be explained further in the course but for now, rest assured: if you want to start developing applications that are identity focused and using the blockchain, this is where you need to be.Created by: The Linux Foundation
Level: Introductory
Related Online Courses
This course takes you through the last nine lessons of CS6750: Human-Computer Interaction as taught in the Georgia Tech Online Master of Science in Computer Science program. In this final course... more
Embedded systems are the fundamental building blocks of our connected world, and Arm-based devices are the industry standard. This course will provide you with the practical skills and confidence... more
Employing monitoring and observability solutions are crucial skills for Software Developers and DevOps professionals to ensure continuous uptime and delivery for their applications. Monitoring is... more
In this course you will learn how to design relational databases and model those designs for others to understand. All forms of Normal Form will be covered so your database designs conform to best... more
On the hardware side, we will mount power analysis attacks on the cryptographic algorithms RSA and AES. We will see that simple power analysis attacks and differential power analysis attacks are... more