YoVDO

Tokenization

Offered By: Bill Buchanan OBE via YouTube

Tags

Data Security Courses Encryption Courses

Course Description

Overview

Explore the fundamentals of tokenization in this 23-minute video lecture, covering key topics such as audit compliance, surrogate identifiers, and tokenization techniques for currency and data. Delve into Visa's best practices for tokenization, token mapping, and pseudonymization. Examine the ledger approach, Feistel structure, and honey encryption methods. Gain valuable insights into data protection and security measures essential for modern information systems and financial transactions.

Syllabus

Audit Compliance
Surrogate identifiers
Tokenization with currency
Tokenization with data
Visa Best Practice for Tokenization
Token Mapping
Pseudonymization
Ledger approach
Feistel structure
Honey Encryption


Taught by

Bill Buchanan OBE

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera