This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn how to secure blockchain applications by examples
Course contents
What you'll learn in this course (3:13)
Next steps (1:57)
First 4 Sessions
1. Overview of Blockchain Technology (13:56)
2. Overview of Ethereum (6:26)
3. Overview of Hyperledger Fabric (6:50)
4. Foundational Blockchain Security (5:51)
5- Advanced Cryptographic Techniques and Methods
PDF File for Session 5 Lecture
a- Multi-signatures (1:04)
b- Zero-knowledge Proofs (0:43)
c- Stealth Addresses (1:42)
d- Ring Signatures (1:04)
e- Confidential Signatures (2:37)
6.1- Network-related Vulnerabilities, Attacks and Defense
PDF File for Session 6 Lecture
a- 51% Attacks (3:30)
b- DDoS Attacks (0:49)
c- Eclipse Attacks (0:56)
d- Replay Attacks (2:02)
e- Routing Attacks (0:47)
f- Sybil Attacks (1:31)
6.2- Node Attacks
Cryptojacking & Miner Exploits (4:03)
7. User-related Vulnerabilities, Attacks and Defense
PDF File for Session 7 Lecture
a- Wallet Considerations (3:46)
b- User Attacks (10:23)
8. System and Process-related Vulnerabilities, Attacks and Defenses
Verge Attacks, Pigeoncoin Hack & SPV Mining Exploit (3:46)
9. Smart Contract-related Vulnerabilities, Attacks and Defenses
Top attack techniques (9:52)
10. Security of Alternative DLT Architectures
DAG-Based DLTs (4:59)
Course Lab- Smart Contract Security
Re-entry and Access Control (17:47)
c- Stealth Addresses
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock