Learn Blockchain Technology & Cryptocurrency in Java
- Descrição
- Currículo
- FAQ
- Revisões
Blockchain is a revolutionary technology that allows for decentralized and distributed storage of information. Maybe the hottest topic at the moment in the field of software engineering – besides artificial intelligence and machine learning – is blockchain technology. Many experts in the industry predict that the blockchain will disrupt the ways we interact with technology.
In this course you will learn about the basics of blockchain technology as well as about cryptocurrencies. You can learn about the concrete implementation of these technologies in Java – although you can skip the implementation parts if you wish.
Chapter 1 – Blockchain Theory
-
the fundamental basics of blockchain technology
-
SHA-256 hashing technique
-
centralized and decentralized ledgers
-
the concept of mining (and miners)
-
consensus algorithms
-
proof of work (PoW) and proof of stake (PoS)
-
the byzantine generals problem
Chapter 2 – Blockchain Implementation
-
implementing a simple blockchain from scratch in Java
Chapter 3 – Cryptocurrency Theory
-
motivation behind cryptocurrencies
-
Merkle trees and transaction verification algorithms
-
mining in cryptocurrencies
-
mempools
-
unspent transaction outputs (UTXOs)
-
elliptic curve cryptography in cryptocurrencies
-
what is a wallet?
-
orpahned blocks and the block verification problem
-
the 51% attack
-
soft fork and hard fork
Chapter 4 – Cryptocurrency Implementation
-
implementing a simple cryptocurrency from scratch in Java
Chapter 5 – Altcoins & Cryptocurrency Evolution
-
Ethereum, Solidity and the Ether cryptocurrency
-
what are ICOs?
-
cardano and ADA
-
altcoins
-
LiteCoin (LTC)
-
Dash
-
layer 1 and layer-2 scaling solutions
-
sharding and rollups (zk-rollups and zk-snarks)
-
coins and tokens
You should take this course, if you are interested in blockchains and cryptocurrency technology. Thanks for joining my course, let’s get started!
-
2What is the motivation behind blockchains?Vídeo Aula
-
3Data structure behind blockchainsVídeo Aula
-
4Blockchains Basics QuizQuestionário
-
5SHA256 hashing algorithmVídeo Aula
-
6SHA256 hashing algorithm exampleVídeo Aula
-
7SHA256 Hashing QuizQuestionário
-
8Decentralized ledgersVídeo Aula
-
9Decentralized Ledger QuizQuestionário
-
10Blockchain mining #1Vídeo Aula
-
11Blockchain mining #2Vídeo Aula
-
12Mining QuizQuestionário
-
13Consensus protocolVídeo Aula
-
14Byzantine generals problemVídeo Aula
-
15What is proof-of-work (PoW)?Vídeo Aula
-
16What is proof-of-stake (PoS)?Vídeo Aula
-
17Consensus Algorithms QuizQuestionário
-
18Decentralized and distributed networksVídeo Aula
-
25Cryptocurrency motivationVídeo Aula
-
26Cryptocurrency policiesVídeo Aula
-
27Cryptocurrencies Basics QuizQuestionário
-
28MempoolsVídeo Aula
-
29Mempools exampleVídeo Aula
-
30Mempools QuizQuestionário
-
31Merkle-tree motivationVídeo Aula
-
32Merkle-tree implementationVídeo Aula
-
33PublicKey and PrivateKeyVídeo Aula
-
34Cryptography QuizQuestionário
-
35UTXOsVídeo Aula
-
36WalletsVídeo Aula
-
37Wallets QuizQuestionário
-
3851% attackVídeo Aula
-
39Orphaned blocks and block verificationVídeo Aula
-
40Who pays the miners exactly?Vídeo Aula
-
41What is a fork?Vídeo Aula
-
42Cryptocurrency implementation IVídeo Aula
-
43Cryptocurrency implementation IIVídeo Aula
-
44Cryptocurrency implementation IIIVídeo Aula
-
45Cryptocurrency implementation IVVídeo Aula
-
46Cryptocurrency implementation VVídeo Aula
-
47Cryptocurrency implementation VIVídeo Aula
-
48Cryptocurrency implementation VIIVídeo Aula
-
49Cryptocurrency implementation VIIIVídeo Aula
-
50BitcoinVídeo Aula
-
51Altcoins and ICOsVídeo Aula
-
52EthereumVídeo Aula
-
53Ethereum and the DAO attackVídeo Aula
-
54Layer 1 scaling - shardingVídeo Aula
-
55Layer 2 scaling - rollupsVídeo Aula
-
56PolygonVídeo Aula
-
57CardanoVídeo Aula
-
58LiteCoinVídeo Aula
-
59DashVídeo Aula
-
60Coins and tokensVídeo Aula
-
61Why do we need elliptic curve cryptography?Vídeo Aula
-
62What are elliptic curves?Vídeo Aula
-
63Point addition and point doublingVídeo Aula
-
64Double and add algorithmVídeo Aula
-
65Elliptic curve discrete logarithm problemVídeo Aula
-
66Elliptic curve based Diffie-Hellman key exchange algorithmVídeo Aula
-
67Digital signatures with elliptic curvesVídeo Aula
-
68RSA and elliptic curve cryptographyVídeo Aula
-
69Useful article on elliptic curvesTexto