GRATIS
LearnQuest vía Coursera
GRATIS

Blockchain Security - Intermediate Practices

  • money

    Cursos gratis (Auditar)

    question-mark
  • earth

    Inglés

  • folder

    NaN

  • certificate

    Guía de Registro en Coursera

    arrow
Acerca de este curso

  • Welcome & Module 1: Securing Blockchain Networks
    • Welcome to Blockchain Security Intermediate Practices! Unveil the keys to the digital fortress that is the blockchain network. This module acquaints you with the high art of defending the blockchain's foundational layers—because even the most avant-garde systems must stand on secure ground. Topics include network encryption, node security, and the intricacies of guarding against Sybil attacks.
  • Module 2: Introduction to Smart Contract Security
    • This module serves as an introduction to the security considerations that are unique to smart contracts in blockchain systems. It aims to equip learners with the principles of secure smart contract development, including best practices for auditing. Emphasis will be placed on balancing contract functionality with security requirements.
  • Module 3: Programming Vulnerabilities
    • This module addresses the general vulnerabilities commonly encountered in programming practices and specifically targets their implications in the realm of blockchain. Topics covered will include arithmetic vulnerabilities, dependencies on external libraries, and issues arising from Right-to-Left Control, among others.
  • Module 4: Blockchain Specific Vulnerabilities
    • This module delves into the vulnerabilities that are specific to blockchain technologies. It discusses unique threat vectors such as access control vulnerabilities, denial-of-service attacks, frontrunning, and more. The module aims to equip learners with specialized knowledge to build secure, blockchain-specific architectures.
  • Module 5: Ethereum Specific Vulnerabilities
    • The focus of this module is on vulnerabilities that are particular to Ethereum, one of the most widely used blockchain platforms. Topics will include, but are not limited to, vulnerabilities arising from block gas limits, forced sending of Ether, and unchecked return values. Special attention will be given to Ethereum's specific architecture and its associated security considerations.