This collection of labs will help CDPSE holders and aspirants gain real-world experience dealing with data security and privacy implementation.Continuing Professional Education (CPE) Credit Count: 32
This lab provides a practical introduction to the cryptologic functions utilized by blockchain technology. Python and CLI tools will be used to show the practical use of crypto functions.
Discover the data structures that some blockchains use to organize and ingest data into the blockchain. We will use python to build out these data structures.
With a basic understanding of hashing and data structures it's time to start building our blockchain! In this lab we will utilize Python to build upon our actions in previous labs to create a genesis block.
A foundational aspect of blockchain is the ability for nodes to communicate to one another on a network. Let’s take a look at basic peer-to-peer network setup and configuration.
Hyperledger is an opensource platform for blockchain implementations. Now that we have a decent foundation of how blockchain functions we will start setting up an actual blockchain system on a few network nodes.
After setting up the open source utilities to implement a blockchain system, we can now put it to use. In this lab we’ll go through the process of using the blockchain for its most basic purposes – creating a transaction.
Now that our blockchain is setup for transactions we can take a look at all the functionality that this new capability has to offer within a transaction.
Crypto Mining is a process used by public blockchains to solve cryptologic problems in a trustless peer-to-peer network. How is this accomplished? In this lab we’ll take you through the basic process of crypto mining using Python.
In this challenge lab you will need to use all of the cryptography and python skills learned in previous labs to complete the objectives.
In this challenge lab you will need to build out a transaction in Hyperledger.
Spectre exploits crucial and vital susceptibilities in today's processors. Spectre uses speculative execution on processors using branch prediction. In other terms, Spectre takes advantages of the processors' performance techniques.
Meltdown exploits crucial and vital susceptibilities in today's processors. Meltdown is similar to Spectre but there are some differences. Meltdown allows access to ANY data that is mapped to current memory space.
Students will analyze a collection of IOT device communications packets and correlate the timing of data spikes with IOT user habits.
This lab will teach a student how to analyze wireless data collection in order to map and characterize a network and the devices resident upon said network.
IoT devices have become much more prevalent in modern society due to most house-hold items’ connectivity to the Internet. For example, doorbells, audio speakers, refrigerators, thermostats, etc. all have the potential to be used maliciously. As a network configuration specialist, it is your responsibility to know how these devices can be manipulated and how this manipulation can be prevented.