Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LearnQuest

Blockchain Security - Intermediate Practices

LearnQuest via Coursera

Overview

This course is intended for blockchain innovators, developers, security analysts, and business leaders seeking to build or enhance secure blockchain networks. With Blockchain Security Foundational Concepts, as its muse, the Blockchain Security Intermediate Practices course journeys through uncharted realms of blockchain exploration, thrilling, intricate, and alluring. Advanced security practices, cryptography, consensus models, and network security are woven together in a harmonious ballet, punctuated by real-world case studies. This course is more than an intellectual dance; it's a challenge and an awakening to the sublime world of blockchain security. Upon completing the course, learners will understand the complexity of cryptographic techniques including has functions and public key cryptography. Learners will also be able to engage with the blockchain security mechanisms, PoW and PoS, safeguard users and nodes, and analyze case studies.

Syllabus

  • Welcome & Module 1: Securing Blockchain Networks
    • Welcome to Blockchain Security Intermediate Practices! Unveil the keys to the digital fortress that is the blockchain network. This module acquaints you with the high art of defending the blockchain's foundational layers—because even the most avant-garde systems must stand on secure ground. Topics include network encryption, node security, and the intricacies of guarding against Sybil attacks.
  • Module 2: Introduction to Smart Contract Security
    • This module serves as an introduction to the security considerations that are unique to smart contracts in blockchain systems. It aims to equip learners with the principles of secure smart contract development, including best practices for auditing. Emphasis will be placed on balancing contract functionality with security requirements.
  • Module 3: Programming Vulnerabilities
    • This module addresses the general vulnerabilities commonly encountered in programming practices and specifically targets their implications in the realm of blockchain. Topics covered will include arithmetic vulnerabilities, dependencies on external libraries, and issues arising from Right-to-Left Control, among others.
  • Module 4: Blockchain Specific Vulnerabilities
    • This module delves into the vulnerabilities that are specific to blockchain technologies. It discusses unique threat vectors such as access control vulnerabilities, denial-of-service attacks, frontrunning, and more. The module aims to equip learners with specialized knowledge to build secure, blockchain-specific architectures.
  • Module 5: Ethereum Specific Vulnerabilities
    • The focus of this module is on vulnerabilities that are particular to Ethereum, one of the most widely used blockchain platforms. Topics will include, but are not limited to, vulnerabilities arising from block gas limits, forced sending of Ether, and unchecked return values. Special attention will be given to Ethereum's specific architecture and its associated security considerations.

Taught by

Howard Poston

Reviews

Start your review of Blockchain Security - Intermediate Practices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.