CSX Emerging Technology Specialist Pathway

Covering blockchain basics as well as the topics of the Internet of Things (IoT) and prevalent attacks.

Difficulty: Multilevel CSF Domain: All domains


Price represents the non member rate.

Buy Now
or pay later by invoice

This collection of labs will help CDPSE holders and aspirants gain real-world experience dealing with data security and privacy implementation.

Continuing Professional Education (CPE) Credit Count: 32


Lesson and Lab Crypto Functions

This lab provides a practical introduction to the cryptologic functions utilized by blockchain technology. Python and CLI tools will be used to show the practical use of crypto functions.

Lesson and Lab Crypto Block Creation

Discover the data structures that some blockchains use to organize and ingest data into the blockchain. We will use python to build out these data structures.

Lesson and Lab Crypto Block Calculations

With a basic understanding of hashing and data structures it's time to start building our blockchain! In this lab we will utilize Python to build upon our actions in previous labs to create a genesis block.

Lesson and Lab Peer to Peer (P2P) Network Setup

A foundational aspect of blockchain is the ability for nodes to communicate to one another on a network. Let’s take a look at basic peer-to-peer network setup and configuration.

Lesson and Lab Hyperledger Fabric Setup

Hyperledger is an opensource platform for blockchain implementations. Now that we have a decent foundation of how blockchain functions we will start setting up an actual blockchain system on a few network nodes.

Lab/Instructional Creating a Transaction

After setting up the open source utilities to implement a blockchain system, we can now put it to use. In this lab we’ll go through the process of using the blockchain for its most basic purposes – creating a transaction.

Lab/Instructional Creating a Transaction 2

Now that our blockchain is setup for transactions we can take a look at all the functionality that this new capability has to offer within a transaction.

Lesson and Lab Crypto Mining Simulation

Crypto Mining is a process used by public blockchains to solve cryptologic problems in a trustless peer-to-peer network. How is this accomplished? In this lab we’ll take you through the basic process of crypto mining using Python.

Challenge Lab Crypto Challenge

In this challenge lab you will need to use all of the cryptography and python skills learned in previous labs to complete the objectives.

Challenge Lab Hyperledger Challenge

In this challenge lab you will need to build out a transaction in Hyperledger.

Lesson and Lab Spectre Mitigation

Spectre exploits crucial and vital susceptibilities in today's processors. Spectre uses speculative execution on processors using branch prediction. In other terms, Spectre takes advantages of the processors' performance techniques.

Lesson and Lab Meltdown Mitigation

Meltdown exploits crucial and vital susceptibilities in today's processors. Meltdown is similar to Spectre but there are some differences. Meltdown allows access to ANY data that is mapped to current memory space.

Lesson and Lab IoT Device Indicators

Students will analyze a collection of IOT device communications packets and correlate the timing of data spikes with IOT user habits.

Lesson and Lab Home Automation Device Patterns

This lab will teach a student how to analyze wireless data collection in order to map and characterize a network and the devices resident upon said network.

Lesson and Lab Identifying Cryptojacking Processes

Using a small amount of JavaScript code, websites can utilize your computers CPU and GPU resources, without your knowledge, to mine cryptocurrencies. This type of cyber attack, referred to as "Cryptojacking", saw an 8,500% increase in occurrences throughout 2017. This lab will teach students how to identify these types of attacks through system resource monitoring.

Lesson and Lab Securing IoT Devices via Firewall

IoT devices have become much more prevalent in modern society due to most house-hold items’ connectivity to the Internet.  For example, doorbells, audio speakers, refrigerators, thermostats, etc. all have the potential to be used maliciously.  As a network configuration specialist, it is your responsibility to know how these devices can be manipulated and how this manipulation can be prevented.