© Copyright 2018 | All Rights Reserved

Member Of:

Powered By DataGamez Team

BLOCKCHAIN & CRYPTOCURRENCY TRAINING

Offered Courses

Blockchain Events & Training has associated with Tertiary Courses  & Blockchain Council to offer Blockchain , Cryptocurrency & Fintech courses.

Ethereum Smart Contract Blockchain Course teaches tools required to build decentralised applications on the Ethereum platform. This course is introducing everything needed to understand the technology, write smart contracts and build applications that interact with them. Participants will learn about the Ethereum platform, the programming language Solidity, how to use web3 framework and lastly, how to tie everything together step by step. After the class, participants will build a fully functioning decentralised application, deploy it and test it.

Course Details

Module 1: Ethereum Basics

  • What is Ethereum ?

  • The Ethereum ecosystem 

  • Ethereum Architecture and Design

  • Opportunities through Ethereum

Module 2: Ethereum Applications

  • DApps and DAOs 

  • What is Mist and how does it work? 

  • What is Ether, an account, a Faucet?

Module 3: Smart Contract

  • Configure and use the most common Ethereum clients

  • Compile, deploy and instantiate contracts

  • Configuring, running and working with the go-ethereum client

  • Blockchain Challenges and Risks

Module 4: Mechanism behind Ethereum

  • The most prominent consensus mechanisms

  • Difference between private, consortium, and public networks

  • What does the data structure look like?

  • How do Smart Contracts work?

Module 5 : Contract Management

  • Understand the different stages of a contract deployment

  • How to interact with a contract once deployed?

  • What does the setup process for a private network look like?

Module 6: Solidity Program language

  • Language used for the development of smart contracts

  • Contract classes, Functions and conditionals

  • Types & Optimisation

  • Global Variables

Module 7 : Contract Development Toolkit

  • Building an interface to interact with a smart contract

  • Setting up event-driven interfaces

  • Write functional tests for smart contracts

  • How to manually test contract functionality?

  • Instantiate web3 and communicate with a contract from an HTML page

Trainer – Mr Ismail

Mr Ismail is IT Project Manager with more than 20 years of experience in Singapore, Malaysia and India, where he manage project development specialized in Customer Relationship management, mobile application, payment system and collaboration solutions.

Ismail holds a Master of Science in Computer Science from Bharathidasan University and Master of Business Administration from Annamalai University, India with experience in the fields of Internet, Mobile Application, Payment system and Blockchain crypto currency skills in the corporate world

Duration: 10 AM to 5 PM (Full Day)

Course Fees: $ 998 SGD

Solidity is a contract-oriented programming language for writing smart contracts. It is used for implementing smart contracts on various blockchain platforms. Solidity is the primary language on Ethereum as well as on other private blockchains such as Monax and its Hyperledger

In this course we will introduce Solidity, which a contract-oriented, high-level language for implementing smart contracts. It was influenced by C++, Python and JavaScript and is designed to target the Ethereum Virtual Machine (EVM). This course will give you a introduction to solidity and will focus on the following areas:

  • Introduction to Block Chain

  • Introduction to Smart Contracts

  • Introduction to Solidity Compiler

  • Fundamentals of Solidity

  • Building typical applications

  • Solidity in Depth

Each module will include a brief description of the related theoretical concepts followed by a related hands-on workshop

Course Details

Module 1: Introduction to Block Chain

  • Definition of Block Chain

  • Concept of Hashing/Encryption

  • Detailed working of Block Chain

  • Block chain Applications

Module 2: Introduction to Smart Contracts

  • Smart contract

  • Our First Contract

  • Contract Structure

  • Function Declarations

Module 3: Introduction to Solidity Compiler

  • Testing with Remix

  • Wei and Ether

  • Concept of Gas 

  • Transactions

Module 4: Fundamentals of Solidity

  • The Solidity Programming Language

  • Contract Deployment

  • Syntax Highlighter

  • Compiling Solidity

  • Testing Architectures

Module 5: Building Typical Applications

  • Voting

  • Blind auction

  • Payments

  • Purchase Remotely

Module 6: Solidity in depth

  • Units and Globally available variables

  • Expressions and Control Structures

  • Security Considerations

Trainer – Dr. Sarita Singh

Dr. Sarita Singh received her Ph.D. degree for her work done in the area of Information Security. She is the recipient of the prestigious Infosys fellowship for pursuing her Ph.D. Programme. She has more than twenty-five years of teaching and research experience in Singapore, Malaysia and India in the field of Programming, Information Security, Web-application Development, Computer Networks and Engineering related modules.

She has presented papers at several National and International Conferences and has written articles for magazines. She has authored text-books for Engineering courses as well.

Duration: 10 AM to 5 PM (Full Day)

Course Fees: $ 998 SGD

There has been a lot of hype around Blockchain technology and Bitcoin in recent times. Almost all Fin-Tech heavy weights are pouring investments into Blockchain technology. Governments and regulators are also equally interested in this. Blockchain is essentially a decentralised and distributed ledger technology that was popularised by the Bitcoin global cryptocurrency platform since 2009.

The potential applications for Blockchains and Bitcoin-like cryptocurrencies are enormous. The course will cover the fundamental aspects of cryptocurrencies, blockchain technologies, and distributed consensus. The topics include

  • Blockchain technology

  • Potential of blockchain

  • Cryptocurrency

  • Bitcoin and Bitcoin Mining

  • Altcoins

Course Details

Module 1: Blockchain Technology

  • What is Blockchain?

  • Decentralization with Blockchain

  • Blockchain Architecture and Design

  • Opportunities through Blockchain

Module 2: Blockchain Applications

  • Crypto Currency

  • Digital Tokens

  • Smart Contract

  • Real Blockchain Application Case Studies

  • Blockchain Challenges and Risks

Module 4: Bitcoin

  • The Birth of Bitcoin

  • How to Store and Use Bitcoins

  • Bitcoin Wallet

  • Bitcoin Mining

  • Strength and Weakness of Bitcoin

Module 5: The Future of Blockchain and Bitcoin

  • Alternatives to Bitcoin - Altcoins

  • Blockchain Community, Politics, and Regulation

  • Security issues with Bitcoins

Module 3: Cryptocurrency

  • What is Cryptocurrency?

  • Advantages of Cryptocurrency

  • Cryptocurrency Trading

Trainer – Dr. Sarita Singh

Dr. Sarita Singh received her Ph.D. degree for her work done in the area of Information Security. She is the recipient of the prestigious Infosys fellowship for pursuing her Ph.D. Programme. She has more than twenty-five years of teaching and research experience in Singapore, Malaysia and India in the field of Programming, Information Security, Web-application Development, Computer Networks and Engineering related modules.

She has presented papers at several National and International Conferences and has written articles for magazines. She has authored text-books for Engineering courses as well.

Duration: 10 AM to 5 PM (Full Day)

Course Fees: $ 998 SGD

With advancement in technology, organizations are now able to collect a large amount of data that are being generated and transferred over the network. Cybersecurity experts may have a hard time monitoring and analysing this data due to the sheer volume which is beyond their capacity to manage. One possible solution that is being widely explored is to use Machine Learning and Data Mining methods for cybersecurity related problems.

Methods of machine learning and data mining can help to build better detectors from massive amounts of complex data that is generated over the Internet. Such methods can also help discover the information required to build more secure systems.

Data can be gathered from a combination of software installed on customer workstations and sensors placed in network segments. This data can be fed to systems that use machine learning which can classify the incoming samples and can distinguish between normal behaviour and any anomalies. Historical data and patterns can be used to compare samples and identify evolving threats.

This course will give you a broad introduction to network security and related cybersecurity problems. It will also explore various machine learning and data mining solutions to cybersecurity problems. The module will focus on the following

  • Introduction to Network Security concepts

  • Basic Functions of Firewalls 

  • Intrusion Detection and Prevention Systems 

  • Collections of application and network data 

  • Apply machine learning solutions to cybersecurity problems

Each module will include a brief description of the related theoretical concepts followed by a related hands-on workshop.

Course Details

Module 1: Introduction to Network Security Concepts

  • Challenges to Securing Information

  • Core principles of Information Security

  • Types of Network Attacks

  • Malware

Module 2: Introduction to Firewalls

  • Types of Firewalls

  • Firewall Design and Architecture

  • Configuring Firewalls

Module 3: Intrusion Detection and Prevention Systems

  • Types of IDS

  • Host and Network based IDS

  • IPS

  • Honeypots

  • Introduction to Snort

Module 4: Introduction to Data Mining and Machine Learning Concepts

  • Supervised /Unsupervised Machine Learning Methods

  • Challenges in Data Mining and Machine Learning

Module 5: Data Collection and Analysis

  • Machine Learning for Anomaly Detection

  • Machine Learning in Intrusion Detection

  • Machine Learning and Network Traffic

  • Emerging Challenges in Cybersecurity

Module 6: Network Forensics

  • Forensic Principles

  • Capturing Network Traffic

  • Use of Cyber Forensic Tools

  • Legal issues

Trainer - Truman Ng

Truman Ng graduated with Bachelor Degree in Electrical Engineering from NUS in year 2002. He designed Artificial Intelligence (AI) controller for DC-DC Power Convertor by using Fuzzy Logic and Neural Network (NN) as his university Final Year Project.

Truman has over 15 years project experiences across Database & Web Design, PLC machinery, Data Centre Design, Structure Cabling System(SCS) and Enterprise Network Design and Implementation. He used to be a network architect for Hewlett Packard, working with a group of virtual team from the US in handling network design and projects in the States.

Truman is the founder of Nexplore (S) Pte Ltd. He provides solutions of Cloud SaaS, IaaS & PaaS and Software Defined Network (SDN), VoIP and Internet Security. He was engaged by Huawei Global Training Centre to provide 60+ consultations and trainings for Internet Service Providers(ISP) from Malaysia, Singapore, Brunei, Philippines, Australia, Poland, Iran, South Africa, Swaziland, Cote Dlvoire, Syria, Uzbekistan, New Zealand and countries over the world. 
As achievement, Truman has successfully completed 100+ IT network projects for Bank, Hotel and Factory within 5 years. 
Truman is certified in PMP, Cisco CCNP, CCIP, CCDP, HP Ase and Huawei HCNP, HCIE R&S, HCNA Cloud, HCNA Security, etc.

Duration: 10 AM to 5 PM (Full Day)

Course Fees: $ 998 SGD

Artificial Intelligence is reckoned to be the fourth major industrial revolution that bring dramatic impact to many fields such as healthcare, robotics, manufacturing. With the explosion of big data analytics, more and more companies are adopting artificial intelligence to drive decision making in organisations and improve operational efficiency.

In this basic course on artificial intelligence, participants will be provided an overview of AI, and explained on how it can be used for an effective and efficient decision making for an organization. The course will be a mixture of engaging short lectures with examples and use cases to help participants take their first steps in the exciting field of Artificial Intelligence

The topics covers

  • Acquire basic understanding of machine learning and artificial intelligence

  • Acquire basic knowledge of the usage of machine learning and artificial intelligence applications

  • Understand the basic workflow of machine learning and artificial intelligence applications

Course Details

Module 1: Introduction to Machine Learning

Module 2: Supervised learning and unsupervised learning
 

Module 3: Machine Learning Model Evaluation

Module 4: Introduction to Neural Network and Artificial Intelligence

Module 5: Deep Learning libraries and frameworks

Module 6: Machine Learning and Artificial Intelligence use cases

Trainer – Dr. Sarita Singh

Dr. Sarita Singh received her Ph.D. degree for her work done in the area of Information Security. She is the recipient of the prestigious Infosys fellowship for pursuing her Ph.D. Programme. She has more than twenty-five years of teaching and research experience in Singapore, Malaysia and India in the field of Programming, Information Security, Web-application Development, Computer Networks and Engineering related modules.

She has presented papers at several National and International Conferences and has written articles for magazines. She has authored text-books for Engineering courses as well.

Duration: 10 AM to 5 PM (Full Day)

Course Fees: $ 998 SGD

Cybersecurity refers to the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

Cybersecurity is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, related personnel, organizational infrastructure, applications, services, telecommunications systems and networks. It also includes transmitted and/or stored information in the cyber environment.

Cybersecurity aims to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.

This course will give you a broad introduction to information security knowledge and will focus on the following areas:

  • Introduction to Information Security Concepts and Principles

  • Introduction to Cryptography

  • Physical and Environmental Security

  • Security Management

  • Communications and Network Security

  • Digital Forensics

Course Details

Module 1: Introduction to Information Security Concepts and Principles

  • Definition of Security

  • Concept of Cyberspace

  • Concept of Cybercrime

  • Introduction to Cyber-security and its importance in today’s world.

Module 2: Introduction to Cryptography

  • Public Key Cryptosystem

  • Private Key Cryptosystem

  • Hashing Functions

  • Popular Algorithms

Module 3: Physical and Environmental Security

  • Identifying Assets, Threats and Vulnerabilities

  • Computer and Physical security

  • Firewalls

  • VPNs

Module 4: Security Management

  • Security Governance

  • Risk Management

  • Business continuity Management

  • Laws and Regulations

Module 5: Communications and Network Security

  • Types of Malware

  • Wireless/ Wired Network Attacks

  • IDS/IPS systems

  • Secure Network Protocols

Module 6: Digital Forensics

  • Introduction to Digital Forensics

  • Gathering and Analyzing Evidence

Trainer – Dr. Sarita Singh

Dr. Sarita Singh received her Ph.D. degree for her work done in the area of Information Security. She is the recipient of the prestigious Infosys fellowship for pursuing her Ph.D. Programme. She has more than twenty-five years of teaching and research experience in Singapore, Malaysia and India in the field of Programming, Information Security, Web-application Development, Computer Networks and Engineering related modules.

She has presented papers at several National and International Conferences and has written articles for magazines. She has authored text-books for Engineering courses as well.

Duration: 10 AM to 5 PM (Full Day)

Course Fees: $ 998 SGD

In today’s world, it is of utmost importance that organizations be prepared to protect themselves from threats in cyberspace.

Cybersecurity is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets

In the earlier session, we had focused on introducing important fundamental concepts related to cybersecurity. Introduction to cryptography, types of firewalls, different types of malware attacks and security managements were key topics discussed along with use of basic security administrator tools.

In this module, we will focus on advanced skills, tools and techniques needed to learn to protect the networks from different types of attacks, secure organizational assets, identify vulnerabilities, ensure the privacy of customers, and build secure systems and infrastructures.

This course will give you a more detailed look at cybersecurity concepts and will focus on the following areas:

  • Advanced Information and Network Security

  • Exploit Programming

  • Mobile Security

  • Wireless Security

  • Web Applications Security

  • Security in a Nutshell

Each module will include a brief description of the related theoretical concepts followed by a related hands-on workshop.

Course Details

Module 1: Advanced Information and Network Security

  • Advanced Cryptography

  • Denial of Service attacks

  • Interception attacks

  • DNS Poisoning

  • ARP Poisoning

  • Network Devices related Security

Module 2: Exploit Programming

  • Introduction to Exploit Programming

  • Popular Malware Attacks

  • Buffer overflow attacks

  • Integer overflow attacks

Module 3: Mobile Security

  • Mobile Malware

  • Phishing, SMishing

  • Operating System and Device Vulnerabilities

Forensic Analysis of Mobile Malware

Module 4: Wireless Security

  • Scanning 802.11 Networks

  • Attacking 802.11 Wireless Networks

  • Exploiting Bluetooth

  • Other Wireless Networks

Module 5: Web Applications Security

  • Types of Application Attacks

  • Cross-site scripting (XSS)

  • XML injection

  • SQL injection

  • Directory Traversal

  • Cookies

  • Session Hijacking

Module 6: Security in a Nutshell

  • Advanced Digital Forensics

  • Linux Security

  • Windows Server Security

  • Access Control Mechanisms

  • Cloud Security

  • Email Security

Trainer – Dr. Sarita Singh

Dr. Sarita Singh received her Ph.D. degree for her work done in the area of Information Security. She is the recipient of the prestigious Infosys fellowship for pursuing her Ph.D. Programme. She has more than twenty-five years of teaching and research experience in Singapore, Malaysia and India in the field of Programming, Information Security, Web-application Development, Computer Networks and Engineering related modules.

She has presented papers at several National and International Conferences and has written articles for magazines. She has authored text-books for Engineering courses as well.

Duration: 10 AM to 5 PM (Full Day)

Course Fees: $ 998 SGD

Contact Us Information

If you are interested in enrolling for the any of the above courses you can contact us by sending an email to contact@worldblockchainevents.com

In today’s world, it is of utmost importance that organizations be prepared to protect themselves from threats in cyberspace.

Cybersecurity is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets

In the earlier session, we had focused on introducing important fundamental concepts related to cybersecurity. Introduction to cryptography, types of firewalls, different types of malware attacks and security managements were key topics discussed along with use of basic security administrator tools.

In this module, we will focus on advanced skills, tools and techniques needed to learn to protect the networks from different types of attacks, secure organizational assets, identify vulnerabilities, ensure the privacy of customers, and build secure systems and infrastructures.

This course will give you a more detailed look at cybersecurity concepts and will focus on the following areas:

  • Advanced Information and Network Security

  • Exploit Programming

  • Mobile Security

  • Wireless Security

  • Web Applications Security

  • Security in a Nutshell

Each module will include a brief description of the related theoretical concepts followed by a related hands-on workshop.

Course Details

Module 1: Advanced Information and Network Security

  • Advanced Cryptography

  • Denial of Service attacks

  • Interception attacks

  • DNS Poisoning

  • ARP Poisoning

  • Network Devices related Security

Module 2: Exploit Programming

  • Introduction to Exploit Programming

  • Popular Malware Attacks

  • Buffer overflow attacks

  • Integer overflow attacks

Module 3: Mobile Security

  • Mobile Malware

  • Phishing, SMishing

  • Operating System and Device Vulnerabilities

Forensic Analysis of Mobile Malware

Module 4: Wireless Security

  • Scanning 802.11 Networks

  • Attacking 802.11 Wireless Networks

  • Exploiting Bluetooth

  • Other Wireless Networks

Module 5: Web Applications Security

  • Types of Application Attacks

  • Cross-site scripting (XSS)

  • XML injection

  • SQL injection

  • Directory Traversal

  • Cookies

  • Session Hijacking

Module 6: Security in a Nutshell

  • Advanced Digital Forensics

  • Linux Security

  • Windows Server Security

  • Access Control Mechanisms

  • Cloud Security

  • Email Security

Trainer – Dr. Sarita Singh

Dr. Sarita Singh received her Ph.D. degree for her work done in the area of Information Security. She is the recipient of the prestigious Infosys fellowship for pursuing her Ph.D. Programme. She has more than twenty-five years of teaching and research experience in Singapore, Malaysia and India in the field of Programming, Information Security, Web-application Development, Computer Networks and Engineering related modules.

She has presented papers at several National and International Conferences and has written articles for magazines. She has authored text-books for Engineering courses as well.

Duration: 10 AM to 5 PM (Full Day)

Course Fees: $ 998 SGD

In today’s world, it is of utmost importance that organizations be prepared to protect themselves from threats in cyberspace.

Cybersecurity is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets

In the earlier session, we had focused on introducing important fundamental concepts related to cybersecurity. Introduction to cryptography, types of firewalls, different types of malware attacks and security managements were key topics discussed along with use of basic security administrator tools.

In this module, we will focus on advanced skills, tools and techniques needed to learn to protect the networks from different types of attacks, secure organizational assets, identify vulnerabilities, ensure the privacy of customers, and build secure systems and infrastructures.

This course will give you a more detailed look at cybersecurity concepts and will focus on the following areas:

  • Advanced Information and Network Security

  • Exploit Programming

  • Mobile Security

  • Wireless Security

  • Web Applications Security

  • Security in a Nutshell

Each module will include a brief description of the related theoretical concepts followed by a related hands-on workshop.

Course Details

Module 1: Advanced Information and Network Security

  • Advanced Cryptography

  • Denial of Service attacks

  • Interception attacks

  • DNS Poisoning

  • ARP Poisoning

  • Network Devices related Security

Module 2: Exploit Programming

  • Introduction to Exploit Programming

  • Popular Malware Attacks

  • Buffer overflow attacks

  • Integer overflow attacks

Module 3: Mobile Security

  • Mobile Malware

  • Phishing, SMishing

  • Operating System and Device Vulnerabilities

Forensic Analysis of Mobile Malware

Module 4: Wireless Security

  • Scanning 802.11 Networks

  • Attacking 802.11 Wireless Networks

  • Exploiting Bluetooth

  • Other Wireless Networks

Module 5: Web Applications Security

  • Types of Application Attacks

  • Cross-site scripting (XSS)

  • XML injection

  • SQL injection

  • Directory Traversal

  • Cookies

  • Session Hijacking

Module 6: Security in a Nutshell

  • Advanced Digital Forensics

  • Linux Security

  • Windows Server Security

  • Access Control Mechanisms

  • Cloud Security

  • Email Security

Trainer – Dr. Sarita Singh

Dr. Sarita Singh received her Ph.D. degree for her work done in the area of Information Security. She is the recipient of the prestigious Infosys fellowship for pursuing her Ph.D. Programme. She has more than twenty-five years of teaching and research experience in Singapore, Malaysia and India in the field of Programming, Information Security, Web-application Development, Computer Networks and Engineering related modules.

She has presented papers at several National and International Conferences and has written articles for magazines. She has authored text-books for Engineering courses as well.

Duration: 10 AM to 5 PM (Full Day)

Course Fees: $ 998 SGD

In today’s world, it is of utmost importance that organizations be prepared to protect themselves from threats in cyberspace.

Cybersecurity is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets

In the earlier session, we had focused on introducing important fundamental concepts related to cybersecurity. Introduction to cryptography, types of firewalls, different types of malware attacks and security managements were key topics discussed along with use of basic security administrator tools.

In this module, we will focus on advanced skills, tools and techniques needed to learn to protect the networks from different types of attacks, secure organizational assets, identify vulnerabilities, ensure the privacy of customers, and build secure systems and infrastructures.

This course will give you a more detailed look at cybersecurity concepts and will focus on the following areas:

  • Advanced Information and Network Security

  • Exploit Programming

  • Mobile Security

  • Wireless Security

  • Web Applications Security

  • Security in a Nutshell

Each module will include a brief description of the related theoretical concepts followed by a related hands-on workshop.

Course Details

Module 1: Advanced Information and Network Security

  • Advanced Cryptography

  • Denial of Service attacks

  • Interception attacks

  • DNS Poisoning

  • ARP Poisoning

  • Network Devices related Security

Module 2: Exploit Programming

  • Introduction to Exploit Programming

  • Popular Malware Attacks

  • Buffer overflow attacks

  • Integer overflow attacks

Module 3: Mobile Security

  • Mobile Malware

  • Phishing, SMishing

  • Operating System and Device Vulnerabilities

Forensic Analysis of Mobile Malware

Module 4: Wireless Security

  • Scanning 802.11 Networks

  • Attacking 802.11 Wireless Networks

  • Exploiting Bluetooth

  • Other Wireless Networks

Module 5: Web Applications Security

  • Types of Application Attacks

  • Cross-site scripting (XSS)

  • XML injection

  • SQL injection

  • Directory Traversal

  • Cookies

  • Session Hijacking

Module 6: Security in a Nutshell

  • Advanced Digital Forensics

  • Linux Security

  • Windows Server Security

  • Access Control Mechanisms

  • Cloud Security

  • Email Security

Trainer – Dr. Sarita Singh

Dr. Sarita Singh received her Ph.D. degree for her work done in the area of Information Security. She is the recipient of the prestigious Infosys fellowship for pursuing her Ph.D. Programme. She has more than twenty-five years of teaching and research experience in Singapore, Malaysia and India in the field of Programming, Information Security, Web-application Development, Computer Networks and Engineering related modules.

She has presented papers at several National and International Conferences and has written articles for magazines. She has authored text-books for Engineering courses as well.

Duration: 10 AM to 5 PM (Full Day)

Course Fees: $ 998 SGD

8. Cryptocurrency, Crowd Trading & Funding Course

CrowdTrading is a brand new way for everyone to enjoy Trading and profit from the knowledge of the crowd . It’s all about putting Big Data in the hands of the people – not the bankers and brokers. In this course you will learn to stop guessing your trades & start crowd trading a Game Changer.

Crowdfunding is a new way of potentially earning higher returns on your savings which can be your next income stream. In this course you will learn how to grow your income from crowd funding. If you got a business idea but no funds you will learn how to get crowdfunding. Crowd Funding allows startups to raise capital without losing equity and investors get an opportunity to potentially earn higher returns .

 

Each module will include a brief description of the related theoretical concepts followed by a related hands-on workshop.

Course Details

Day 1:

  • What is Crowdfunding
    Peer-to-Peer Lending, Donation, Reward , Equity Based Crowd Funding

  • Introduction to Alternative Lending
    Funding Process
    Benefits to Investors

  • Crowd Trading

  • Seasonality

  • Forex Foundations.

  • Forex Terminology, Market Structure & Turning Points.

  • Strategy and Application
    Forex Time Zones
    Trading Styles

  • Adopting a Winning Mindset.

  • Forex Correlations.

  • Order Types.

  • Multiple Time Frame Analysis.

  • Forex Fundamentals.

  • Technical Analysis.

  • New Analysis.

  • Cryptocurrency Trading.

  • ICO.

  • Digital Exchanges.

  • Understanding different types of Wallets.

  • Risk Management

Day 2:

  • Preparing to Trade.

  • Cryptocurrency & Forex Broker.

  • Live Trading and Analysis.

  • Trade Management

 Trainer - Kishore M

Kishore M ( B.COM, MBA, CEP (IIT), ADSM) is an Ex-Hedge Fund Manager and has over a decade of experience in the Stock, CFD, Forex, ADR’s, Commodities, Index, Futures, Options & Cryptocurrency. He received his Master in Business Administration from Institute for Technology and Management in association/collaboration with Southern Newhampshire University Manchester, the USA earlier known as New Hampshire College, Mastering Alternative Investments Certificate from INSEAD, his certificate in Computer Network & Internet Applications Course(CEP) from IIT kharagpur and his Advance Diploma in Computer Systems Management from NIIT.

He is a certified Investment Representative, ETS Derivatives Qualified Trader. He is trained by Chicago Board of Exchange and Pacific Stock Exchange Members in Derivatives Instruments on Options & Futures Trading, and educated in Derivatives instruments from the University of California Berkeley (Ext), USA.

He started his career with a Securities Broking Firm on the OTCEI exchange as a Private fund &EquityManager and subsequently headed several startups in Asia and in US ( Silicon Valley ). He has conducted Stock & Derivatives seminars for International Brokers such as REFCO based in Singapore and Regional brokers such as CIMB based in Malaysia.

He has been featured in Singapore Stock Exchange Magazine , Indonesia (JawaPos) & Middle East Newspaper (Khaleej Times) and has also been featured in Bloomberg TV, BBC, Malaysia Business TV Channel & Singapore Channel NewsAsia , News Radio 93.8 FM, Asian Banker Journal, and on Global Hedge Fund websites such as Hedge fund Center, HedgeWeek, HedgeFund Research and Hedge Funds World.

His Entrepreneurial skills had won him the TII status(Technopreneur Investment Incentive Status) from EDB Singapore Government. He is a member of TiE world’s leading Venture Capital Association and one of the most sought-after speaker for entrepreneurship, capital markets, derivatives, cryptocurrency and Alternative Investment.

He helps companies launch their Tokens and provides all the required tools and services for running a successful ICO/ IEO.  He also provides Forex, Derivatives & Cryptocurrency workshop to senior corporate management teams, Broking Houses and Derivative Exchanges Members and conducts Financial Markets & Digital Currency Seminars to public audiences across Asia & Middle East www.championtradersacademy.com. He has trained over 50,000 participants in 10 countries (Hongkong, Malaysia, Singapore, Indonesia, Middle East, Philippines, London etc) in the area of alternative investments, some of his participants include professionals from ABN AMRO Bank, RHB Securities, AMEX, Deutsche Bank, HSBC, Citibank, Doha Bank, CIMB Securities, Manfinancial, REFCO, DBSVICKERS, CSFB, UOB Bank. Under his proprietary trading company – www.futurescapitalholdings.com he has a performance of 99.05% return (2003-2004) and 233.13% return (2003-2005) attested & certified by Auditors.”

Duration: 10 AM to 5 PM (Full Day)

Course Fees: $ 5000 SGD