Course Overview:
This dynamic instructor led course covers all known aspects of Blockchain security that exist in the Blockchain environment today. This course provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more.
Course Objectives:
Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:
- Identifying and differentiating between security threats and attacks on a Blockchain network.
- Blockchain security methods, best practices, risk mitigation, and more.
- All known (to date) cyber-attack vectors on the Blockchain.
- Performing Blockchain network security risk analysis.
- A complete understanding of Blockchain’s inherent security features and risks.
- An excellent knowledge of best security practices for Blockchain System/Network Administrators.
- Demonstrating appropriate Blockchain
Pre-requisites:
This course is highly technical. To prepare for the class student should know:
- Have a comprehensive understanding of Hyperledger, Ethereum, or Blockchain Architecture
Target Audience:
- Blockchain Architects
- Blockchain Developers
- Application Developers
- Blockchain System Administrators
- Network Security Architects
- Cyber Security Experts
- IT Professionals w/cyber security experience
Course Duration:
- 21 hours – 3 days
Course Content:
- Fundamental Blockchain Security
- Cryptography for the Blockchain
- A Brief Introduction to Blockchain
- Blockchain Security Assumptions
- Limitations of Basic Blockchain Security
- Consensus in the Blockchain
- Blockchain Consensus and Byzantine Generals
- Introduction to Blockchain Consensus Security o Proof of Work
- Proof of Stake
- Other Blockchain Consensus Algorithms
- Advanced Blockchain Security Mechanisms
- Architectural Security Measures
- Permissioned Blockchains
- Checkpointing
- Advanced Cryptographic Solutions o Multiparty Signatures
- Zero-Knowledge Proofs
- Stealth Addresses
- Ring Signatures
- Confidential Transactions
- Smart Contract Security
- Introduction to Smart Contracts
- Smart Contract Security Considerations
- Smart Contract Code Auditing
- Blockchain Risk Assessment
- Blockchain Risk Considerations
- Regulatory Requirements
- Blockchain Architectural Design
- Basic Blockchain Security
- User Security
- Node Security
- Network Security
- Blockchain for Business
- Introduction to Ethereum Security
- Introduction to Hyperledger Security
- Introduction to Corda Security
- Securely Implementing Business Blockchains
- Business Operations
- Data Management
- Infrastructure
- Legal and Regulatory Compliance
- Network-Level Vulnerabilities and Attacks
- 51% Attacks
- Denial of Service Attacks
- Eclipse Attacks
- Replay Attacks
- Routing Attacks
- Sybil Attacks
- System-Level Vulnerabilities and Attacks
- The Bitcoin Hack
- The Verge Hack
- The EOS Vulnerability
- The Lisk Vulnerability
- Smart Contract Vulnerabilities and Attacks
- Reentrancy
- Access Control
- Arithmetic
- Unchecked Return Values
- Denial of Service
- Bad Randomness
- Race Conditions
- Timestamp Dependence
- Short Addresses
- Security of Alternative DLT Architectures
- Introduction to DAG-Based DLTs
- Advantages of DAG-Based DLTs
- Limitations of DAG-Based DLTs