No. of Courses :
03
Rating :
waiting
Reviews :
waiting
Students Enrolled :
Waiting

Farhan Khan

Trainer

is a technologist, architect, researcher, innovator, writer, and social entrepreneur. He has over 15 years of experience working in the global IT industry. He started his journey as a hard-core software engineer and learned many languages like C/C++, Visual C++, Java, PHP, Pascal, Torque, JavaScript, and many more. His work covers the 360 degrees of software development comprises mobile, web, network, game, image processing, system-level, and desktop applications (cross-platform).


Courses by Frahan Khan

Career Track

Blockchain Specialization Course For developersAs our current human civilization is passing through the post-pandemic time and technological advancement, it became inevitable to find new business models and systems in our existing world. The concept of decentralization is the next big thing for the entire world. Therefore, the demand for blockchain architects, developers, engineers, and thinkers are growing exponentially everywhere.

No. of Courses :
03
Reviews :
waiting
Students Enrolled :
waiting

3 Courses


Programming in Ethereum (Solidity and Smart Contracts)

  1. Understanding Public Blockchain
  2. Introduction to Ethereum Blockchain Network
  3. Ethereum Programming Platform
  4. Setup Development Environment (31 Jan to Feb 6)
  5. Basics of Solidity Language
  6. Compile and Deploy your first program (Feb 7 to Feb 17)
  7. Create Data Storage Program (Exercise)
  8. Create Escrow Program (Exercise)

Decentralized Applications Development

  1. Analysis on Decentralization (Feb 18 – Feb 25)
  2. DAPPs Use cases
  3. Web3 Technologies for the development
  4. Setup DAPP Development Environment (Feb 26 – Mar 8)
  5. Create DAPP BackEnd
  6. Create DAPP FrontEnd
  7. Test your
  8. Oraclize
  9. Final Thoughts

Role of Security Within Blockchain

  1. Foundation of Public Blockchain Security
  2. Foundation of Private Blockchain Security
  3. Contract Security and Issues
  4. Contract Unit Testing
  5. Security Patterns
  6. Protecting Contract Exercise
  7. Upgrade Patterns Exercise
  8. Final Thoughts