Get in Touch

Course Outline

Introduction

Identity Management and Self-Sovereignty

Security, Control, and Portability

Overview of Public and Permissioned Blockchains

Building an Indy-Based Identity Management System

Controlling Permissions

Decentralizing Permissions

Testing and Deployment

Summary and Conclusion

Requirements

  • Experience in programming
  • Basic understanding of blockchain networks is beneficial
  • Proficiency with Linux

Target Audience

  • Developers
 14 Hours

Testimonials (1)

Related Categories