In this course you learn how to secure blockchain applications.


Learning Objectives

Coming soon...


Topics and Subtopics

Here is the list of topics and subtopics that are covered in this course:


1. Overview of Blockchain, Ethereum and Hyperledger

  • Blockchain Fundamentals
  • Core Components
  • Blocks
  • Chains
  • Network (public vs. private, permissioned vs. permissionless)
  • Demo
  • Working of Blockchain
  • Shared Ledger
  • Cryptography
  • Public/Private Key 
  • Hash Function
  • Wallet
  • Consensus
  • PoW
  • PoS
  • BFT
  • PoET
  • Smart Contracts


  • Ethereum Fundamentals
  • Understanding Ethereum Blockchain
  • Understanding Transaction Gas and Miners
  • How Ethereum Transactions works 
  • Lab on Ethereum Blockchain and Smart Contracts


  • Hyperledger Fabric Fundamentals
  • Understanding Hyperledger Fabric Blockchain
  • Understanding Asset and Ledger
  • How Hyperledger Fabric Transactions works 
  • Lab on Hyperledger fabric Blockchain and Smart Contracts


2. Advanced Cryptographic Techniques and Methods

  • Multi-signatures
  • Zero-knowledge Proofs
  • Stealth Addresses
  • Ring Signatures
  • Confidential Signatures


3. Network-related Vulnerabilities, Attacks and defense

  • Network attacks
  • 51% attack
  • DDoS
  • Eclipse attacks
  • Replay attacks
  • Routing attacks
  • Sybil attacks
  • Node attacks
  • Cryptojacking
  • Miner exploits


4. User-related Vulnerabilities, attacks and defense

  • Wallet considerations
  • Hot vs. cold (hardware wallet)
  • Best practices
  • User Attacks
  • Air Drops and Hard Fork Scams
  • Fake Wallets
  • Fake Sites
  • Wallet Exploits

5. System/Process-related Vulnerabilities, attacks and Defenses

  • Verge Attacks
  • Pigeoncoin Hack
  • SPV Mining Exploit


6. Smart Contract-related Vulnerabilities, attacks and defenses

  • Primer on Solidity and smart contracts – Ethereum
  • Regulatory Drivers
  • Legality
  • Characteristics and Programming
  • Smart Contract Audit Considerations
  • Tools
  • Top attack techniques
  • Access control
  • Default visibility
  • Reentrancy
  • Integer overflow and underflow
  • Unchecked return
  • Timestamp manipulation
  • Bad randomness
  • Front running
  • Denial of services
  • Short address
  • Coding analysis
  • Control flow analysis
  • Error handling
  • State management
  • Dynamic code analysis
  • Manual code analysis
  • Automated code analysis
  • Best practices for smart contracts


7. Security of Alternative DLT Architectures

  • CIntroduction to DAG-Based DLTs
  • Advantages of DAG-Based DLTs
  • Limitations of DAG-Based DLTs


8. Blockchain platforms and security

  • Introduction to Ethereum Security
  • Introduction to Hyperledger Security
  • Introduction to Corda Security



Requirements

Good knowledge of blockchain technology and cybersecurity concepts



Related Courses






Complete Training Bundle

If you are serious about becoming a pro blockchain specialist, you should enroll in our Complete Blockchain Development Training. This bundle covers all essential and practical topics related to blockchain design and development. For $290 monthly subscription, you can have access to 300+ hours of hands-on project-based training covering all courses related to blockchain technology like Hyperledger, Ethereum, Solidity, Blockchain Security, Corda R3 and more. Click here to learn more.







What Is Next?

After finishing this course, you can enroll in any of following classes:





Recommended Free Courses

If you are new to the IT or programming, we suggest the following free courses:


Select a pricing plan and sign up

$190

Paid Course

2 payments of $119/m

Paid Course

4 payments of $69/m

Paid Course