Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn how to secure blockchain applications by examples
Course contents
What you'll learn in this course (3:13)
Next steps (1:57)
First 4 Sessions
1. Overview of Blockchain Technology (13:56)
2. Overview of Ethereum (6:26)
3. Overview of Hyperledger Fabric (6:50)
4. Foundational Blockchain Security (5:51)
5- Advanced Cryptographic Techniques and Methods
PDF File for Session 5 Lecture
a- Multi-signatures (1:04)
b- Zero-knowledge Proofs (0:43)
c- Stealth Addresses (1:42)
d- Ring Signatures (1:04)
e- Confidential Signatures (2:37)
6.1- Network-related Vulnerabilities, Attacks and Defense
PDF File for Session 6 Lecture
a- 51% Attacks (3:30)
b- DDoS Attacks (0:49)
c- Eclipse Attacks (0:56)
d- Replay Attacks (2:02)
e- Routing Attacks (0:47)
f- Sybil Attacks (1:31)
6.2- Node Attacks
Cryptojacking & Miner Exploits (4:03)
7. User-related Vulnerabilities, Attacks and Defense
PDF File for Session 7 Lecture
a- Wallet Considerations (3:46)
b- User Attacks (10:23)
8. System and Process-related Vulnerabilities, Attacks and Defenses
Verge Attacks, Pigeoncoin Hack & SPV Mining Exploit (3:46)
9. Smart Contract-related Vulnerabilities, Attacks and Defenses
Top attack techniques (9:52)
10. Security of Alternative DLT Architectures
DAG-Based DLTs (4:59)
Course Lab- Smart Contract Security
Re-entry and Access Control (17:47)
Teach online with
DAG-Based DLTs
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock