Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Blockchain and Smart Contracts Security

Description

Learn about security concerns, risk mitigation techniques, and how to configure and implement security controls to protect Blockchain from a breach or attack.

Tags

Syllabus

Introduction
  • Security concerns with blockchain
  • What you should know
1. Demystifying Blockchain
  • What is blockchain?
  • Smart contracts and dApps
  • How blockchain works
2. Security Properties of Blockchain
  • Consensus
  • Immutability
  • Cryptography: Keys and addresses
  • Cryptography: Validation
3. Security Model for the Blockchain Ecosystem
  • Overall technology architecture
  • Attack surface and vectors
  • Security model
4. Blockchain Platform Security
  • Proof-of-work protocol attacks
  • Proof-of-stake protocol attacks
5. Distributed Apps and Smart Contracts Security
  • Smart contracts and EVM
  • Anatomy of a smart contract
  • Deploying a smart contract
  • Smart contracts threats: Part one
  • Smart contracts threats: Part two
  • Secure design
6. Non-distributed Apps and Enabler Services
  • Blockchain ecosystem threats: Part one
  • Blockchain ecosystem threats: Part two
  • Blockchain ecosystem threats: Part three
7. End User Security
  • Wallet and keys security
  • Web session security
Conclusion
  • Next steps

Online Course


Blockchain and Smart Contracts Security

Affiliate notice

Learn about security concerns, risk mitigation techniques, and how to configure and implement security controls to protect Blockchain from a breach or attack.

Introduction
  • Security concerns with blockchain
  • What you should know
1. Demystifying Blockchain
  • What is blockchain?
  • Smart contracts and dApps
  • How blockchain works
2. Security Properties of Blockchain
  • Consensus
  • Immutability
  • Cryptography: Keys and addresses
  • Cryptography: Validation
3. Security Model for the Blockchain Ecosystem
  • Overall technology architecture
  • Attack surface and vectors
  • Security model
4. Blockchain Platform Security
  • Proof-of-work protocol attacks
  • Proof-of-stake protocol attacks
5. Distributed Apps and Smart Contracts Security
  • Smart contracts and EVM
  • Anatomy of a smart contract
  • Deploying a smart contract
  • Smart contracts threats: Part one
  • Smart contracts threats: Part two
  • Secure design
6. Non-distributed Apps and Enabler Services
  • Blockchain ecosystem threats: Part one
  • Blockchain ecosystem threats: Part two
  • Blockchain ecosystem threats: Part three
7. End User Security
  • Wallet and keys security
  • Web session security
Conclusion
  • Next steps