Day 1
– Storage Protection (X.1220 & X.nspam)
Subtitle: Theory and Practice of Storage Protection for Preventing Data Exfiltration and Responding to Ransomware
Pre-requirements:
- Laptop (Windows 11 recommended) – Mac is also supported, but training will primarily be based on Windows
Details:
Morning Theory
:
- Understanding international storage protection standards X.1220 and X.nspam
- Introduction to X.1220 and X.nspam technologies
- Overview of the ProtectMedicalData Initiative and global collaborations
- Demonstration and hands-on experience with folder-level storage protection software and application-level storage protection software
Afternoon Practice:
- Understanding international storage protection standards X.1220 and X.nspam
- Introduction to X.1220 and X.nspam technologies
- Overview of the ProtectMedicalData Initiative and global collaborations
- Demonstration and hands-on experience with folder-level storage protection software and application-level storage protection software
Day 2 – Passwordless Authentication (X.1280) Part 1
Subtitle: Overview and Theoretical Application of Passwordless Authentication Based on International Standards
Pre-requirements:
- Laptop (Windows 11 or Mac)
- Smartphone
- GitHub account
Details:
Morning Theory:
- Introduction to the international standard X.1280
- Overview of the Passwordless Alliance and global collaborations
- User-level experience with Passwordless X1280
Afternoon Theory + Practice:
- Team formation and AWS environment setup
- Understanding X.1280 server architecture and Docker image installation training
- Reviewing sample code on GitHub and preparing the environment
- Hands-on practice session
Day 3 – Passwordless Authentication (X.1280) Part 2 (Web developer skillset required)
Subtitle: Advanced Configuration and Practical Application of Passwordless X1280
Details:
Morning Practice:
- Configuring and testing the Passwordless X1280 server
- Integrating the mobile app with the server
- Connecting sample services to the Passwordless X1280 server
- Running user registration and approval scenarios
Afternoon Application & Wrap-Up:
- Group project: Designing a “Targeted Model Combining Storage Protection + Passwordless Authentication"
- Team presentations and discussions
- Instructor feedback & Q&A
- Program summary, evaluation, and completion ceremony
Note; For each technology, two dedicated instructors will lead the training: one will give the lecture, while the other will serve as an on-site interpreter and assistant instructor. n addition, for the Passwordless authentication training, each team will need two AWS VMs for two days.