Practical Blockchain Security
- Descrição
- Currículo
- FAQ
- Revisões
Welcome to the Practical blockchain security course. This course looks at how architecture, engineering, software design, and software tools all influence how information and data security is implemented in different kinds of blockchains. We will focus on the three most popular blockchains, Bitcoin, Ethereum, and Hyperledger. This course is a holistic view of information security, those things that cannot be directly controlled, those things that can be directly controlled, and how controls, technical, procedural, and in some cases policy-based can enhance a company’s security posture for its blockchain implementation.
Course Objectives:
Classify the Security Fundamentals of Blockchain Architecture
Classify the Security Fundamentals of Blockchain Engineering
Compare and Contrast Front End and Back End risks
Summarize common Blockchain Security Mechanisms
Summarize Blockchain Protocols
Summarize common Blockchain controls that can be used to enhance security
Summarize the role ERC’s have in Blockchain Security
Appraise Common Smart Contract Security Risks
This course has been designed to be applicable to all levels of knowledge about the blockchain and takes a total view approach to blockchain engineering, security, and code development. From tools to techniques, ports, and protocols, ERCs, and other methods to update systems, this course is comprehensive across the cloud, hyper-ledger, Ethereum, and points in between. From code and good coding practices, to how to do good effective DAO governance, there is great information and tips throughout this course for the things you want to do in the blockchain.
The author of this course has certifications in Security, Blockchain Security, NFTs, and Blockchain Engineering, and gives up-to-date information about the state of Blockchain Security, and how it can be accomplished as part of a normal business process.
Welcome to the course!
-
4Blockchain Architecture OverviewVídeo Aula
-
5Blockchain LayersVídeo Aula
-
6Ethereum OverviewVídeo Aula
-
7Ethereum ArchitectureVídeo Aula
-
8Ethereum Post Merge ArchitectureVídeo Aula
-
9Bitcoin ArchitectureVídeo Aula
-
10Hyperledger ArchitectureVídeo Aula
-
11Tezos ArchitectureVídeo Aula
-
12Flow ArchitectureVídeo Aula
-
13Cardano ArchitectureVídeo Aula
-
14Wax ArchitectureVídeo Aula
-
15Side ChainsVídeo Aula
-
16Blockchain BridgesVídeo Aula
-
17Real World Example Tornado CashVídeo Aula
-
18Blockchain Engineering OverviewVídeo Aula
-
19Blockchain Block FormatVídeo Aula
-
20The Genesis BlockVídeo Aula
-
21Merkle TreesVídeo Aula
-
22Walkthrough Block ExplorerVídeo Aula
-
23Blockchain Wallet AddressingVídeo Aula
-
24Proof Of Work ConsensusVídeo Aula
-
25Proof of Stake ConsensusVídeo Aula
-
26Other types of ConsensusVídeo Aula
-
27Public and Private BlockchainsVídeo Aula
-
28Hard and Soft ForksVídeo Aula
-
29Blockchain Security AssumptionsVídeo Aula
-
30CryptographyVídeo Aula
-
31Public and Private KeysVídeo Aula
-
32HashingVídeo Aula
-
33Time StampingVídeo Aula
-
34Peer to Peer networking (Ethereum Example)Vídeo Aula
-
35Overview of MFAVídeo Aula
-
36MFA And BlockchainVídeo Aula
-
37ReactVídeo Aula
-
38AngularVídeo Aula
-
39Vue.JSVídeo Aula
-
40OWASP Modeling for Blockchain Part 1Vídeo Aula
-
41OWASP Modeling for Blockchain Part 2Vídeo Aula
-
42Wallet AttacksVídeo Aula
-
43Client VulnerabilitiesVídeo Aula
-
44User BehaviorVídeo Aula
-
45Consensus VulnerabilitiesVídeo Aula
-
46Mining Pool VulnerabilitiesVídeo Aula
-
47Network VulnerabilitiesVídeo Aula
-
48DDoS AttacksVídeo Aula
-
49Delay AttacksVídeo Aula
-
50Eclipse AttacksVídeo Aula
-
51P2P and DHT AttacksVídeo Aula
-
52Partition AttacksVídeo Aula
-
53Sybil AttacksVídeo Aula
-
54Time JackingVídeo Aula
-
55Transaction AttacksVídeo Aula
-
56Selfish Mining AttacksVídeo Aula
-
69What is Hyperledger?Vídeo Aula
-
70Hyperledger Security ModelVídeo Aula
-
71Hyperledger PeersVídeo Aula
-
72Hyperledger Ordering ServiceVídeo Aula
-
73Hyperledger MSP'sVídeo Aula
-
74Hardware Security ModulesVídeo Aula
-
75Hyperledger Data PrivacyVídeo Aula
-
76Hyperledger Specific Security RisksVídeo Aula