YoVDO

Understanding and Using Verifiable Credentials

Offered By: John Savill's Technical Training via YouTube

Tags

Decentralized Identity Courses Identity Management Courses Public Key Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into a comprehensive video lecture on decentralized identity and verifiable credentials. Explore the evolution of identity from real-world to centralized digital systems, and understand the challenges faced today. Learn about becoming your own identity provider, the concept of attestations, and the importance of trust and proof in digital identities. Discover the intricacies of decentralized identifiers (DIDs), including their requirements, association with public keys, and the role of DID documents. Examine various DID methods and their significance. Delve into verifiable credentials, understanding the interactions between issuers, holders, and verifiers. Witness practical demonstrations, including the use of Microsoft Entra for issuing and verifying credentials. Gain insights into wallet backup and recovery, the importance of this technology, and considerations as responsibilities shift in the digital identity landscape. Benefit from detailed explanations, real-world examples, and closing thoughts on the future of decentralized identity.

Syllabus

- Introduction
- Identity in the real world
- Identity with centralized identity
- Challenges today
- Me as my own identity provider
- Attestations from an issuer
- Trusts
- The need for proof
- How we prove things with computers
- How to know it’s the right public key for an entity
- Decentralized identifier DID
- Requirements for a DID
- Associating DID to public key
- Solution
- How do I rotate keys? DID document
- What is a DID and how is it working
- Methods
- What really matters!
- Why is the DID so ugly
- Verifiable credentials at last
- Issuer, holder and verifier all together
- Lets see this in action
- Using Microsoft Entra to issue and verify
- How to backup and recover if lose wallet
- Why do we care?
- Some considerations as responsibilities shift
- Closing thoughts


Taught by

John Savill's Technical Training

Related Courses

Introduction to Cryptology
Indian Institute of Technology Roorkee via Swayam
Classical Cryptosystems and Core Concepts
University of Colorado System via Coursera
Cyber Attack Countermeasures
New York University (NYU) via Coursera
Introduction to Blockchain Technologies
INSEAD via Coursera
Introduction to Applied Cryptography
University of Colorado System via Coursera