Practical Blockchain Security
- Description
- Curriculum
- FAQ
- Reviews
Welcome to the Practical blockchain security course. This course looks at how architecture, engineering, software design, and software tools all influence how information and data security is implemented in different kinds of blockchains. We will focus on the three most popular blockchains, Bitcoin, Ethereum, and Hyperledger. This course is a holistic view of information security, those things that cannot be directly controlled, those things that can be directly controlled, and how controls, technical, procedural, and in some cases policy-based can enhance a company’s security posture for its blockchain implementation.
Course Objectives:
Classify the Security Fundamentals of Blockchain Architecture
Classify the Security Fundamentals of Blockchain Engineering
Compare and Contrast Front End and Back End risks
Summarize common Blockchain Security Mechanisms
Summarize Blockchain Protocols
Summarize common Blockchain controls that can be used to enhance security
Summarize the role ERC’s have in Blockchain Security
Appraise Common Smart Contract Security Risks
This course has been designed to be applicable to all levels of knowledge about the blockchain and takes a total view approach to blockchain engineering, security, and code development. From tools to techniques, ports, and protocols, ERCs, and other methods to update systems, this course is comprehensive across the cloud, hyper-ledger, Ethereum, and points in between. From code and good coding practices, to how to do good effective DAO governance, there is great information and tips throughout this course for the things you want to do in the blockchain.
The author of this course has certifications in Security, Blockchain Security, NFTs, and Blockchain Engineering, and gives up-to-date information about the state of Blockchain Security, and how it can be accomplished as part of a normal business process.
Welcome to the course!
-
3Blockchain Architecture OverviewVideo lesson
-
4Blockchain LayersVideo lesson
-
5Ethereum OverviewVideo lesson
-
6Ethereum ArchitectureVideo lesson
-
7Ethereum Post Merge ArchitectureVideo lesson
-
8Bitcoin ArchitectureVideo lesson
-
9Hyperledger ArchitectureVideo lesson
-
10Tezos ArchitectureVideo lesson
-
11Flow ArchitectureVideo lesson
-
12Cardano ArchitectureVideo lesson
-
13Wax ArchitectureVideo lesson
-
14Side ChainsVideo lesson
-
15Blockchain BridgesVideo lesson
-
16Real World Example Tornado CashVideo lesson
-
17Blockchain Engineering OverviewVideo lesson
-
18Blockchain Block FormatVideo lesson
-
19The Genesis BlockVideo lesson
-
20Merkle TreesVideo lesson
-
21Walkthrough Block ExplorerVideo lesson
-
22Blockchain Wallet AddressingVideo lesson
-
23Proof Of Work ConsensusVideo lesson
-
24Proof of Stake ConsensusVideo lesson
-
25Other types of ConsensusVideo lesson
-
26Public and Private BlockchainsVideo lesson
-
27Hard and Soft ForksVideo lesson
-
28Blockchain Security AssumptionsVideo lesson
-
29CryptographyVideo lesson
-
30Public and Private KeysVideo lesson
-
31HashingVideo lesson
-
32Time StampingVideo lesson
-
33Peer to Peer networking (Ethereum Example)Video lesson
-
34Overview of MFAVideo lesson
-
35MFA And BlockchainVideo lesson
-
36ReactVideo lesson
-
37AngularVideo lesson
-
38Vue.JSVideo lesson
-
39OWASP Modeling for Blockchain Part 1Video lesson
-
40OWASP Modeling for Blockchain Part 2Video lesson
-
41Wallet AttacksVideo lesson
-
42Client VulnerabilitiesVideo lesson
-
43User BehaviorVideo lesson
-
44Consensus VulnerabilitiesVideo lesson
-
45Mining Pool VulnerabilitiesVideo lesson
-
46Network VulnerabilitiesVideo lesson
-
47DDoS AttacksVideo lesson
-
48Delay AttacksVideo lesson
-
49Eclipse AttacksVideo lesson
-
50P2P and DHT AttacksVideo lesson
-
51Partition AttacksVideo lesson
-
52Sybil AttacksVideo lesson
-
53Time JackingVideo lesson
-
54Transaction AttacksVideo lesson
-
55Selfish Mining AttacksVideo lesson
-
68What is Hyperledger?Video lesson
-
69Hyperledger Security ModelVideo lesson
-
70Hyperledger PeersVideo lesson
-
71Hyperledger Ordering ServiceVideo lesson
-
72Hyperledger MSP'sVideo lesson
-
73Hardware Security ModulesVideo lesson
-
74Hyperledger Data PrivacyVideo lesson
-
75Hyperledger Specific Security RisksVideo lesson
External Links May Contain Affiliate Links read more