Companies Home Search Profile

Practical Blockchain Security

Focused View

Dan Morrill

22:07:36

128 View
  • 1. Introduction.mp4
    01:31
  • 2. Why take this course.mp4
    02:17
  • 01. Blockchain Architecture Overview.mp4
    20:12
  • 02. Blockchain Layers.mp4
    05:36
  • 03. Ethereum Overview.mp4
    18:42
  • 04. Ethereum Architecture.mp4
    08:26
  • 05. Ethereum Post Merge Architecture.mp4
    10:19
  • 06. Bitcoin Architecture.mp4
    08:40
  • 07. Hyperledger Architecture.mp4
    12:53
  • 08. Tezos Architecture.mp4
    10:52
  • 09. Flow Architecture.mp4
    18:34
  • 10. Cardano Architecture.mp4
    10:28
  • 11. Wax Architecture.mp4
    17:19
  • 12. Side Chains.mp4
    06:48
  • 13. Blockchain Bridges.mp4
    17:58
  • 14. Real World Example Tornado Cash.mp4
    12:44
  • 01. Blockchain Engineering Overview.mp4
    10:30
  • 02. Blockchain Block Format.mp4
    07:49
  • 03. The Genesis Block.mp4
    15:17
  • 04. Merkle Trees.mp4
    09:53
  • 05. Walkthrough Block Explorer.mp4
    03:51
  • 06. Blockchain Wallet Addressing.mp4
    03:29
  • 07. Proof Of Work Consensus.mp4
    16:11
  • 08. Proof of Stake Consensus.mp4
    17:29
  • 09. Other types of Consensus.mp4
    18:52
  • 10. Public and Private Blockchains.mp4
    22:46
  • 11. Hard and Soft Forks.mp4
    14:10
  • 12. Blockchain Security Assumptions.mp4
    07:16
  • 13. Cryptography.mp4
    09:51
  • 14. Public and Private Keys.mp4
    08:17
  • 15. Hashing.mp4
    08:56
  • 16. Time Stamping.mp4
    13:33
  • 17. Peer to Peer networking (Ethereum Example).mp4
    16:16
  • 01. Overview of MFA.mp4
    17:03
  • 02. MFA And Blockchain.mp4
    07:31
  • 03. React.mp4
    11:07
  • 04. Angular.mp4
    15:19
  • 05. Vue.JS.mp4
    06:19
  • 06. OWASP Modeling for Blockchain Part 1.mp4
    25:52
  • 07. OWASP Modeling for Blockchain Part 2.mp4
    21:55
  • 08. Wallet Attacks.mp4
    08:54
  • 09. Client Vulnerabilities.mp4
    10:13
  • 10. User Behavior.mp4
    10:40
  • 01. Consensus Vulnerabilities.mp4
    07:30
  • 02. Mining Pool Vulnerabilities.mp4
    11:27
  • 03. Network Vulnerabilities.mp4
    22:23
  • 04. DDoS Attacks.mp4
    21:31
  • 05. Delay Attacks.mp4
    16:31
  • 06. Eclipse Attacks.mp4
    09:29
  • 07. P2P and DHT Attacks.mp4
    16:01
  • 08. Partition Attacks.mp4
    11:12
  • 09. Sybil Attacks.mp4
    09:09
  • 10. Time Jacking.mp4
    07:54
  • 11. Transaction Attacks.mp4
    06:27
  • 12. Selfish Mining Attacks.mp4
    06:41
  • 1. Mining Overview.mp4
    09:28
  • 2. Solo Mining.mp4
    09:47
  • 3. Mining Pools.mp4
    11:27
  • 4. Proof of Stake Post Merge Ethereum.mp4
    10:19
  • 5. Crypto Mining Malware (Cryptojacking).mp4
    12:17
  • 6. Zero Trust Models.mp4
    19:48
  • 7. Byzantine Fault Tolerance.mp4
    13:58
  • 1. AWS Managed Blockchain Service Overview.mp4
    07:59
  • 2. AWS Hyperledger.mp4
    13:28
  • 3. AWS Ethereum.mp4
    13:05
  • 4. AWS QLDB Quantum Ledger Database.mp4
    10:19
  • 5. Azure Blockchain as a Service Overview.mp4
    05:26
  • 1. What is Hyperledger.mp4
    09:11
  • 2. Hyperledger Security Model.mp4
    10:02
  • 3. Hyperledger Peers.mp4
    16:58
  • 4. Hyperledger Ordering Service.mp4
    12:25
  • 5. Hyperledger MSPs.mp4
    12:48
  • 6. Hardware Security Modules.mp4
    04:21
  • 7. Hyperledger Data Privacy.mp4
    11:33
  • 8. Hyperledger Specific Security Risks.mp4
    09:16
  • 1. What are DAGs.mp4
    08:05
  • 2. Reasons to Use DAG as an Architecture and Data Storage.mp4
    06:39
  • 3. IOTA.mp4
    20:15
  • 1. Common Threats and Incidents.mp4
    13:34
  • 2. Basic Security Mechanisms.mp4
    20:18
  • 3. AES.mp4
    07:54
  • 4. Other types of Hashes (Uncommon).mp4
    07:31
  • 5. Other Security Mechanisms (Uncommon).mp4
    18:01
  • 1. Understanding Blockchain Tokens.mp4
    16:15
  • 2. Blockchain Tokens.mp4
    11:46
  • 3. ERC-20.mp4
    08:00
  • 4. ERC-721.mp4
    16:23
  • 5. ERC-1155.mp4
    07:33
  • 6. ERC-1411.mp4
    09:11
  • 7. Other Tokens and Protocols.mp4
    13:15
  • 8. Common TCPIP Ports used in Blockchain.mp4
    15:40
  • 9. Blockchain As A Service.mp4
    12:03
  • 1. Balancing Risk Overview.mp4
    15:18
  • 2. Normal Risks.mp4
    17:43
  • 3. Value Risks.mp4
    12:14
  • 4. Smart Contract Risks.mp4
    15:38
  • 5. Example - Flash Loan Attack.mp4
    08:25
  • 1. DAO Overview.mp4
    21:18
  • 2. DAOs and Smart Contracts.mp4
    18:55
  • 3. Common DAO Security Risks.mp4
    19:46
  • 4. DAO Governance Tokens.mp4
    22:05
  • 1. Smart Contract Vulnerabilities Part 1.mp4
    10:59
  • 2. Smart Contract Vulnerabilities Part 2.mp4
    15:31
  • 3. Smart Contract Vulnerabilities Part 3.mp4
    12:57
  • 4. Smart Contracts security tools.mp4
    13:50
  • 5. SecDevOps for Blockchain.mp4
    16:19
  • 1. Summary.mp4
    01:27
  • Description


    Blockchain Security from A to Z

    What You'll Learn?


    • Classify the Security Fundamentals of Blockchain architecture
    • Classify the Security Fundamentals of Blockchain Engineering
    • Compare and Contrast Front End and Back End risks
    • Summarize common Blockchain Security Mechanisms
    • Summarize Blockchain Protocols
    • Summarize the role ERC’s have in Blockchain Security
    • Appraise Common Smart Contract Security Risks

    Who is this for?


  • Anyone interested in blockchain security
  • More details


    Description

    Welcome to the Practical blockchain security course. This course looks at how architecture, engineering, software design, and software tools all influence how information and data security is implemented in different kinds of blockchains. We will focus on the three most popular blockchains, Bitcoin, Ethereum, and Hyperledger. This course is a holistic view of information security, those things that cannot be directly controlled, those things that can be directly controlled, and how controls, technical, procedural, and in some cases policy-based can enhance a company's security posture for its blockchain implementation.


    Course Objectives:


    Classify the Security Fundamentals of Blockchain Architecture

    Classify the Security Fundamentals of Blockchain Engineering

    Compare and Contrast Front End and Back End risks

    Summarize common Blockchain Security Mechanisms

    Summarize Blockchain Protocols

    Summarize common Blockchain controls that can be used to enhance security

    Summarize the role ERC’s have in Blockchain Security

    Appraise Common Smart Contract Security Risks


    This course has been designed to be applicable to all levels of knowledge about the blockchain and takes a total view approach to blockchain engineering, security, and code development. From tools to techniques, ports, and protocols, ERCs, and other methods to update systems, this course is comprehensive across the cloud, hyper-ledger, Ethereum, and points in between. From code and good coding practices, to how to do good effective DAO governance, there is great information and tips throughout this course for the things you want to do in the blockchain.

    The author of this course has certifications in Security, Blockchain Security, NFTs, and Blockchain Engineering, and gives up-to-date information about the state of Blockchain Security, and how it can be accomplished as part of a normal business process.

    Welcome to the course!



    Who this course is for:

    • Anyone interested in blockchain security

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dr. Dan Morrill teaches at several universities and certificate based boot camps. As a professor of online learning since 2014, Dan has supported a diverse student population to succeed in an online environment. This includes the use of online systems to develop comprehensive study guides, education standards, and process learning. In addition to his focus on student outcomes, Dan has over 20 years of experience in cyber security and information technology. He has written multiple books on cloud computing, e-commerce, security, and SEO. In addition to supporting startups, he is a passionate supporter of startup culture as well. He obtained a BS in Information Systems Management, an MS in E-commerce, and a Ph.D. in Cyber Security.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 107
    • duration 22:07:36
    • Release Date 2023/05/17

    Courses related to Blockchain

    Courses related to Cyber Security