Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
Learn about security concerns, risk mitigation techniques, and how to configure and implement security controls to protect Blockchain from a breach or attack.
Tags
Syllabus
Introduction
- Security concerns with blockchain
- What you should know
- What is blockchain?
- Smart contracts and dApps
- How blockchain works
- Consensus
- Immutability
- Cryptography: Keys and addresses
- Cryptography: Validation
- Overall technology architecture
- Attack surface and vectors
- Security model
- Proof-of-work protocol attacks
- Proof-of-stake protocol attacks
- Smart contracts and EVM
- Anatomy of a smart contract
- Deploying a smart contract
- Smart contracts threats: Part one
- Smart contracts threats: Part two
- Secure design
- Blockchain ecosystem threats: Part one
- Blockchain ecosystem threats: Part two
- Blockchain ecosystem threats: Part three
- Wallet and keys security
- Web session security
- Next steps
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/6c3775df5607.jpeg)
Blockchain and Smart Contracts Security
Affiliate notice
-
TypeOnline Course
-
Provider
Learn about security concerns, risk mitigation techniques, and how to configure and implement security controls to protect Blockchain from a breach or attack.
Introduction
- Security concerns with blockchain
- What you should know
- What is blockchain?
- Smart contracts and dApps
- How blockchain works
- Consensus
- Immutability
- Cryptography: Keys and addresses
- Cryptography: Validation
- Overall technology architecture
- Attack surface and vectors
- Security model
- Proof-of-work protocol attacks
- Proof-of-stake protocol attacks
- Smart contracts and EVM
- Anatomy of a smart contract
- Deploying a smart contract
- Smart contracts threats: Part one
- Smart contracts threats: Part two
- Secure design
- Blockchain ecosystem threats: Part one
- Blockchain ecosystem threats: Part two
- Blockchain ecosystem threats: Part three
- Wallet and keys security
- Web session security
- Next steps
Tags
Loading...
Saving...
Loading...