Companies Home Search Profile

SEC554 2022

Focused View

8:47:06

166 View
    1. What Is Blockchain
  • 1. Blockchain Fundamentals.mp4
    01:15
  • 2. Meet The Author.mp4
    01:04
  • 3. Course Roadmap 1.mp4
    00:13
  • 4. Course Roadmap 2.mp4
    00:09
  • 5. Objectives for Day 1 Blockchain Fundamentals.mp4
    00:51
  • 6. Course Roadmap 3.mp4
    00:07
  • 7. Definition.mp4
    01:43
  • 8. Origin Story and the Bitcoin White Paper.mp4
    01:07
  • 9. Distributed Ledger Technology.mp4
    01:33
  • 10. How It Works.mp4
    01:24
  • 11. Public Blockchains.mp4
    01:22
  • 12. Private vs Permissionless Blockchains.mp4
    01:13
  • 13. Tokenized vs Tokenless Blockchains.mp4
    00:43
  • 14. Various Uses for Blockchain Technology.mp4
    00:31
  • 15. Cryptocurrencies and PeerToPeer Payments.mp4
    01:24
  • 16. Decentralized Finance DeFi.mp4
    01:31
  • 17. dApps.mp4
    00:48
  • 18. Privacy and Utility Tokens.mp4
    01:07
  • 19. Dark Net Markets.mp4
    01:00
  • 20. Consumer User Cases.mp4
    00:43
  • 21. Supply Chains.mp4
    00:56
  • 22. Authentication.mp4
    00:27
  • 23. Education Diplomas and Certificate Validation.mp4
    00:39
  • 24. Insurance.mp4
    00:43
  • 25. Government Use Cases.mp4
    01:58
  • 26. Proof of Ownership.mp4
    01:06
    2. What Is a Smart Contract
  • 1. Course Roadmap.mp4
    00:11
  • 2. Definition.mp4
    01:12
  • 3. Purpose.mp4
    00:27
  • 4. Smart Contracts Brief.mp4
    00:30
  • 5. Smart Contract Analogy Selling a House.mp4
    02:10
  • 6. Supply Chains Use Case.mp4
    01:26
  • 7. Decentralized Finance DeFi Use Case 1.mp4
    01:11
  • 8. Decentralized Finance DeFi Use Case 2.mp4
    00:47
  • 9. Gambling Use Case.mp4
    00:39
  • 10. Social Networks Use Case.mp4
    00:58
  • 11. Gaming Use Case.mp4
    01:03
  • 12. Ethereum Platform.mp4
    01:24
  • 13. EOSIO Platform.mp4
    00:28
  • 14. Hyperledger Platform.mp4
    00:32
  • 15. Corda Platform.mp4
    00:49
  • 16. Other Examples of Smart Contracts.mp4
    00:44
    3. Keys Wallets and Cryptography
  • 1. Course Roadmap.mp4
    00:15
  • 2. Fundamentals.mp4
    01:20
  • 3. Hash Functions 1.mp4
    01:54
  • 4. Hash Functions 2.mp4
    00:41
  • 5. PublicAsymmetric vs Symmetric 1.mp4
    00:57
  • 6. PublicAsymmetric vs Symmetric 2.mp4
    00:52
  • 7. PublicAsymmetric vs Symmetric 3.mp4
    02:51
  • 8. Elliptic Curve Technology.mp4
    00:58
  • 9. Cryptocurrency Wallets.mp4
    00:30
  • 10. Paper Wallets.mp4
    01:06
  • 11. Hardware Wallets.mp4
    05:02
  • 12. Software Wallets.mp4
    00:33
  • 13. Brain Wallet.mp4
    00:53
  • 14. NonDeterministic Wallet.mp4
    00:39
  • 15. Deterministic Wallets .mp4
    00:57
  • 16. Hierarchical Deterministic Wallets.mp4
    01:10
  • 17. Mnemonic Keys and the BIP39 Standard.mp4
    01:11
  • 18. Lab 11 Create a Hierarchical Deterministic Software Wallet.mp4
    00:28
  • 19. Lab 11 Walkthrough.mp4
    12:46
    4. Consensus Mechanisms
  • 1. Course Roadmap.mp4
    00:45
  • 2. Proof of Work Consensus Mechanism.mp4
    02:26
  • 3. Bitcoin Mining The Golden Age.mp4
    00:41
  • 4. Bitcoin Mining The Silver Age.mp4
    01:50
  • 5. Bitcoin Mining The Modern Age.mp4
    00:48
  • 6. So You Want to be a Crypto Miner.mp4
    00:22
  • 7. Solo Mining.mp4
    01:06
  • 8. Mining Pools.mp4
    00:47
  • 9. Cloud Mining.mp4
    01:15
  • 10. The Mining Process 1.mp4
    01:11
  • 11. The Mining Process 2.mp4
    00:56
  • 12. The Mining Process 3.mp4
    00:50
  • 13. The Mining Process 4.mp4
    00:35
  • 14. The Mining Process 5.mp4
    00:33
  • 15. The Mining Process 6.mp4
    01:29
  • 16. The Mining Process 7.mp4
    00:39
  • 17. The Mining Process 8.mp4
    01:55
  • 18. The Mining Process 9.mp4
    00:59
  • 19. The Mining Process 10.mp4
    03:06
  • 20. Byzantine Fault Tolerance.mp4
    02:04
  • 21. Proof of Stake Consensus Mechanism.mp4
    02:01
  • 22. Delegated Proof of Stake.mp4
    01:09
  • 23. Blockchain Trilemma.mp4
    01:23
  • 24. Lab 12 Join a Blockchain Mining Pool.mp4
    01:01
  • 25. Lab 12 Walkthrough.mp4
    23:36
    5. Blockchain Transactions
  • 1. Course Roadmap.mp4
    00:49
  • 2. Transactions Overview Bitcoin 1.mp4
    01:07
  • 3. Transactions Overview Bitcoin 2.mp4
    02:38
  • 4. Transactions Overview Bitcoin 3.mp4
    02:00
  • 5. Transactions Visualization Bitcoin.mp4
    01:34
  • 6. Transaction Script Types Bitcoin.mp4
    01:04
  • 7. Lightning Network.mp4
    02:09
  • 8. Bitcoin TX Example.mp4
    02:31
  • 9. Ethereum Transaction Example.mp4
    02:48
  • 10. Block Explorers Online Transaction Analysis.mp4
    00:48
  • 11. Block Explorers Blockchair Example.mp4
    00:44
  • 12. Block Explorers Etherscan Example.mp4
    00:51
  • 13. Lab 13 Blockchain Transaction Analysis.mp4
    02:57
  • 14. Lab 13 Walkthrough.mp4
    08:17
    6. Blockchain Components
  • 1. Course Roadmap.mp4
    00:30
  • 2. The Bitcoin Network.mp4
    01:37
  • 3. Bitcoin Source Code Overview.mp4
    01:58
  • 4. Bitcoin Nodes and Clients 1.mp4
    01:51
  • 5. Bitcoin Nodes and Clients 2.mp4
    00:41
  • 6. The RPCAPI.mp4
    01:11
  • 7. Lab 14 Interact with the bitcoin RPCAPI.mp4
    00:25
  • 8. Exercise Walkthrough 1.mp4
    08:56
  • 9. Ethereum Quick Recap.mp4
    01:39
  • 10. EVM Ethereum Virtual Machine.mp4
    02:35
  • 11. Ethereum Networks.mp4
    00:48
  • 12. Ethereum Client Software.mp4
    00:49
  • 13. Ethereum Client Software Metamask.mp4
    00:54
  • 14. DeFi on Ethereum.mp4
    03:15
  • 15. Swapping with DeFi Uniswap.mp4
    01:50
  • 16. Lab 15 Use Metamask to Swap Ethereum on a DEX.mp4
    00:47
  • 17. Exercise Walkthrough 2.mp4
    14:17
    1. The Bitcoin Network and Security Overview
  • 1. Blockchain Security _Attacks Defenses .mp4
    00:46
  • 2. Course Roadmap 1.mp4
    00:22
  • 3. Course Roadmap 2.mp4
    00:58
  • 4. Objectives for Day 2 Blockchain Security Attacks Defenses.mp4
    01:21
  • 5. Course Roadmap 3.mp4
    00:07
  • 6. Assumptions on Bitcoins Security 1.mp4
    01:19
  • 7. Assumptions on Bitcoins Security 2.mp4
    00:43
  • 8. Assumptions on Bitcoins Security 3.mp4
    01:03
  • 9. Assumptions on Bitcoins Security 4.mp4
    01:04
  • 10. Assumptions on Bitcoins Security 5.mp4
    01:08
  • 11. Assumptions on Bitcoins Security 6.mp4
    01:17
  • 12. Assumptions on Bitcoins Security 7.mp4
    01:25
  • 13. The Security Model.mp4
    00:37
  • 14. The Security Model Control Over Keys.mp4
    02:04
  • 15. The Security Model Independent Transaction Validation.mp4
    01:14
  • 16. A Chain of Trust 1.mp4
    01:00
  • 17. A Chain of Trust 2.mp4
    00:57
    2. Weakness and Vulnerabilities
  • 1. Course Roadmap .mp4
    00:15
  • 2. Types of Vulnerabilities to the Blockchain.mp4
    00:47
  • 3. Network Attacks 51 Attack 1.mp4
    03:04
  • 4. Network Attacks 51 Attack 2.mp4
    00:59
  • 5. Network Attacks .mp4
    01:35
  • 6. Network Attacks Case Study 1.mp4
    01:15
  • 7. Network Attacks Case Study 2.mp4
    01:44
  • 8. Network Attacks Sybil Attack.mp4
    01:31
  • 9. Node Security Denial of Service.mp4
    01:03
  • 10. Node Security Timestamp Hacking.mp4
    01:30
  • 11. Node Security Code Bugs and CVEs.mp4
    01:58
  • 12. Exchanges and Centralized Integration.mp4
    01:41
  • 13. Exchanges and Centralized Integration Case Study 1.mp4
    01:08
  • 14. Exchanges and Centralized Integration Case Study 2.mp4
    01:53
  • 15. User and Personal Security.mp4
    03:46
  • 16. User and Personal Security Phishing.mp4
    00:40
  • 17. User and Personal Security Phishing Case Study.mp4
    01:29
  • 18. User and personal Security SIM Swapping.mp4
    01:48
  • 19. User and Personal Security SIM Swapping Case Study.mp4
    00:49
  • 20. User and Personal Security Accidental Loss.mp4
    01:37
  • 21. User and Personal Security Private Key Exposure.mp4
    00:41
  • 22. Lab 21 Exploiting Private Key Exposure.mp4
    00:38
  • 23. Lab 21 Walkthrough.mp4
    07:30
    3. Attacks on Private Keys
  • 1. Course Roadmapp.mp4
    00:53
  • 2. BIP32 Wallet Mnemonics.mp4
    01:27
  • 3. The BIP39 Specification 1.mp4
    01:02
  • 4. The BIP39 Specification 2.mp4
    00:32
  • 5. The BIP39 Specification 3.mp4
    00:55
  • 6. The BIP39 Specification 4.mp4
    00:57
  • 7. The BIP39 Specification 5.mp4
    00:43
  • 8. The BIP39 Specification 6.mp4
    00:39
  • 9. The BIP39 Specification 7.mp4
    00:26
  • 10. PBKDF2 1.mp4
    01:17
  • 11. PBKDF2 2.mp4
    03:00
  • 12. Attacking BIP32.mp4
    02:00
  • 13. Attacking BIP32 Estimated Time to Crack.mp4
    00:51
  • 14. Mnemonic Brute Forcing Case Study.mp4
    02:02
  • 15. Lab 22 Brute Force a Mnemonic Seed Phrase.mp4
    00:59
  • 16. Lab 22 Walkthrough.mp4
    07:48
    4. Attacks on Privacy
  • 1. Course Roadmap .mp4
    00:38
  • 2. Overview 1.mp4
    01:05
  • 3. Overview 2.mp4
    01:42
  • 4. Overview 3.mp4
    01:08
  • 5. Attacking Privacy.mp4
    02:07
  • 6. Blockchain Based Attacks Heuristical Analysis.mp4
    02:19
  • 7. Blockchain Based Attacks Change Address Detection 1.mp4
    01:21
  • 8. Blockchain Based Attacks Change Address Detection 2.mp4
    01:15
  • 9. Blockchain Based Attacks Transaction Graph.mp4
    01:26
  • 10. Blockchain Based Attacks Amount.mp4
    01:20
  • 11. Blockchain Based Attacks Forced Address Reuse.mp4
    01:12
  • 12. Blockchain Based Attacks Timing and Spending Correlations.mp4
    01:24
  • 13. NonBlockchain Based Attacks Traffic Analysis.mp4
    00:56
  • 14. NonBlockchain Based Attacks Custodial Wallets.mp4
    01:27
  • 15. NonBlockchain Based Attacks Wallet History Internet Use.mp4
    01:23
  • 16. NonBlockchain Based Attacks Taint Analysis.mp4
    01:24
  • 17. NonBlockchain Based Attacks Metadata Linkage.mp4
    01:55
  • 18. Defenses for Privacy and Anonymity.mp4
    01:11
  • 19. Avoid Address Reuse.mp4
    01:42
  • 20. Multiple Transactions.mp4
    00:44
  • 21. Change Avoidance Multiple Change Outputs.mp4
    00:44
  • 22. Coinjoin 1.mp4
    01:10
  • 23. Coinjoin 2.mp4
    00:32
  • 24. Lightning Network.mp4
    01:35
    5. Malicious Uses of Blockchain
  • 1. Course Roadmap .mp4
    00:17
  • 2. Malicious Use Cases of Blockchain 1.mp4
    00:58
  • 3. Malicious Use Cases of Blockchain 2.mp4
    00:59
  • 4. Financing Criminal Activity.mp4
    01:11
  • 5. Ransomware Statistics and Overview.mp4
    01:24
  • 6. Ransomware Wannacry.mp4
    00:42
  • 7. Ransomware Case Study.mp4
    01:14
  • 8. Hiding Financial Data.mp4
    01:07
  • 9. Investment Scams and Ponzi Schemes.mp4
    01:52
  • 10. Investment Scams and Ponzi Schemes Case Study.mp4
    01:06
  • 11. Direct Theft on the Blockchain.mp4
    02:02
  • 12. Cryptojacking.mp4
    01:27
  • 13. Cryptojacking Coinhive.mp4
    01:41
  • 14. Lab 23 Install a Cryptojacker Mining Agent.mp4
    00:41
  • 15. Lab 23 Walkthrough.mp4
    12:55
    6. Regulatory Compliance and Investigation
  • 1. Course Roadmap .mp4
    01:02
  • 2. The Current Regulatory Environment.mp4
    01:15
  • 3. Criminal Code Authorities.mp4
    01:00
  • 4. Regulatory Authorities 1.mp4
    01:16
  • 5. Regulatory Authorities 2.mp4
    01:56
  • 6. Regulatory Authorities 3.mp4
    02:08
  • 7. Tax Forms.mp4
    00:57
  • 8. Dark Net Markets and TOR 1.mp4
    01:27
  • 9. Dark Net Markets and TOR 2.mp4
    02:01
  • 10. Operation Disruptor.mp4
    01:29
  • 11. How They Find Criminals.mp4
    02:21
  • 12. OSINT and Blockchain Forensics.mp4
    01:05
  • 13. Why Monero.mp4
    01:49
  • 14. Monero Overview.mp4
    02:23
  • 15. Monero Key Terms.mp4
    01:31
  • 16. Lab 24 OSINT to Discover Hidden Bitcoin Funds.mp4
    01:55
  • 17. Lab 24 Walkthrough.mp4
    05:59
    1. The Smart Contract Lifecycle
  • 1. Smart Contract Security Vulnerabilities Exploitation.mp4
    00:56
  • 2. Course Roadmap 1.mp4
    00:15
  • 3. Course Roadmap 2.mp4
    00:44
  • 4. Objectives for Day 3 Attacking Exploiting Smart Contracts.mp4
    00:23
  • 5. Course Roadmap 3.mp4
    00:14
  • 6. Smart Contracts on the Blockchain 1.mp4
    00:24
  • 7. Smart Contracts on the Blockchain 2.mp4
    00:24
  • 8. Smart Contracts on the Blockchain 3.mp4
    00:24
  • 9. Smart Contracts on the Blockchain 4.mp4
    00:40
  • 10. Smart Contracts on the Blockchain 5.mp4
    00:31
  • 11. Smart Contracts on the Blockchain 6.mp4
    00:20
  • 12. Ethereum Networks.mp4
    01:21
  • 13. Infura.mp4
    00:41
  • 14. GanacheCLI.mp4
    00:29
  • 15. GanacheUI.mp4
    00:43
  • 16. Lab 31 Deploy a Private Ethereum Blockchain.mp4
    00:15
  • 17. Lab 31 Walkthrough.mp4
    03:44
    2. Solidity
  • 1. Course Roadmap.mp4
    00:17
  • 2. Introduction to Solidity Programming.mp4
    00:39
  • 3. Structure of a Solidity Program.mp4
    01:42
  • 4. Constructs and Syntax Value Types.mp4
    01:06
  • 5. Constructs and Syntax Reference Types.mp4
    00:47
  • 6. Constructs and Syntax Global Namespace.mp4
    00:38
  • 7. Constructs and Syntax Access Levels.mp4
    01:36
  • 8. Constructs and Syntax Functions.mp4
    00:57
  • 9. Constructs and Syntax Function Modifiers.mp4
    00:57
  • 10. Constructs and Syntax Events.mp4
    00:35
  • 11. High Level Compiling and Deployment Process.mp4
    01:25
  • 12. Compiler Solc.mp4
    00:54
  • 13. Compiler ABI Application Binary Interface and EVM Bytecode.mp4
    00:41
  • 14. EVM Opcodes.mp4
    00:33
  • 15. EVM Opcodes Important Examples.mp4
    00:42
  • 16. Remix IDE.mp4
    00:46
  • 17. Etherscan.mp4
    02:00
  • 18. Lab 32 Compile and Analyze EVM Code.mp4
    00:43
  • 19. Lab 32 Walkthrough.mp4
    10:11
  • 20. Deployment Fundamentals.mp4
    00:45
  • 21. Deployment Options.mp4
    01:20
  • 22. Deployment Options Metamask 1.mp4
    00:17
  • 23. Truffle.mp4
    00:39
  • 24. Truffle Basic Commands 1.mp4
    00:20
  • 25. Truffle Basic Commands 2.mp4
    00:14
  • 26. Truffle Basic Commands 3.mp4
    00:25
  • 27. Contract Interaction Overview.mp4
    01:09
  • 28. Web3.mp4
    00:58
  • 29. Calldata 1.mp4
    00:30
  • 30. Calldata 2.mp4
    00:40
  • 31. Calldata 3.mp4
    00:09
  • 32. Interact with a Contract Curl 1.mp4
    00:46
  • 33. Interact with a Contract Curl 2.mp4
    00:17
  • 34. Interact with a Contract OpenZeppelin CLI.mp4
    00:38
  • 35. Interact with a Contract Web3js via OpenZeppelin CLI.mp4
    00:30
  • 36. Lab 33 Deploy a Smart Contract.mp4
    00:30
  • 37. Lab 33 Walkthrough.mp4
    17:05
    3. Smart Contract Vulnerabilities
  • 1. Course Roadmap.mp4
    00:28
  • 2. Security and Smart Contracts.mp4
    00:53
  • 3. Overview of Vulnerability Classes.mp4
    00:34
  • 4. Reentrancy Recusive Call Attacks.mp4
    01:24
  • 5. Integer OverflowUnderflow Arithmetic Attacks.mp4
    01:32
  • 6. Transaction Order Dependence.mp4
    00:59
  • 7. Denial of Service with Block Gas Limit.mp4
    01:10
  • 8. Unprotected Selfdestruct.mp4
    00:45
  • 9. Timestamp Manipulation.mp4
    01:13
  • 10. Delegatecall.mp4
    00:58
  • 11. Inforgraphic of Vulnerability Classes and Causes.mp4
    00:29
  • 12. Inforgraphic of Vulnerability Attacks and Consequences.mp4
    01:10
  • 13. The DAO Hack.mp4
    01:07
  • 14. The Parity Bug.mp4
    00:46
  • 15. Types of Tools.mp4
    00:36
  • 16. Mythril MythX.mp4
    00:42
  • 17. Slither.mp4
    00:48
  • 18. Manticore.mp4
    00:54
  • 19. Echidna.mp4
    00:48
  • 20. Solgraph.mp4
    00:32
  • 21. IDAEVM in Development.mp4
    00:36
  • 22. ZIION.mp4
    00:43
  • 23. Honorable Mentions.mp4
    00:30
  • 24. Published Research on Smart Contract Security Scanning.mp4
    00:54
  • 25. Lab 34 Scan a Smart Contract for Vulnerabilities.mp4
    00:43
  • 26. Lab 34 Walkthrough.mp4
    08:33
    4. Attacking and Exploiting Smart Contracts
  • 1. Course Roadmap.mp4
    00:15
  • 2. Exploiting Ehereum Smart Contracts 1.mp4
    00:41
  • 3. The DAO Hack Case Study 1.mp4
    01:30
  • 4. The DAO Hack Case Study 2.mp4
    01:08
  • 5. The DAO Hack Case Study 3.mp4
    00:34
  • 6. The DAO Hack Case Study 4.mp4
    01:14
  • 7. The DAO Hack Case Study 5.mp4
    00:13
  • 8. The DAO Hack Case Study 6.mp4
    00:52
  • 9. The DAO Hack Case Study 7.mp4
    00:43
  • 10. The DAO Hack Case Study 8.mp4
    00:25
  • 11. The DAO Hack Case Study 9.mp4
    00:23
  • 12. The DAO Hack Case Study 10.mp4
    00:32
  • 13. The DAO Hack Case Study 11.mp4
    00:23
  • 14. The DAO Hack Case Study 12.mp4
    00:15
  • 15. The DAO Hack Case Study 13.mp4
    00:10
  • 16. The DAO Hack Case Study 14.mp4
    00:07
  • 17. The DAO Hack Case Study 15.mp4
    00:10
  • 18. The DAO Hack Case Study 16.mp4
    00:13
  • 19. The DAO Hack Case Study 17.mp4
    00:28
  • 20. The DAO Hack Case Study 18.mp4
    00:50
  • 21. Preventing the Exploit.mp4
    01:31
  • 22. Exploiting Ehereum Smart Contracts 2.mp4
    00:46
  • 23. Lab 35 Identifying a Smart Contract Exploit.mp4
    00:37
  • 24. Lab 35 Walkthrough.mp4
    06:03
  • 25. Security Exploitation Tools teEther.mp4
    00:43
  • 26. Security Exploitation Tools Scrooge McEtherface.mp4
    00:39
  • 27. Security Exploitation Tools Karl.mp4
    01:04
  • 28. Another Parity Wallet Bug Case Study 1.mp4
    02:39
  • 29. Another Parity Wallet Bug Case Study 2.mp4
    00:38
  • 30. Another Parity Wallet Bug Case Study 3.mp4
    00:16
  • 31. Another Parity Wallet Bug Case Study 4.mp4
    00:45
  • 32. Lab 36 Exploit a Smart Contract.mp4
    00:39
  • 33. Lab 36 Walkthrough.mp4
    24:59

More details


User Reviews
Rating
0
0
0
0
0
average 0
Total votes0
Focused display
The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing.
  • language english
  • Training sessions 342
  • duration 8:47:06
  • Release Date 2023/03/30

Courses related to Information Security