Infosec - Blockchain Security
- Offered byCoursera
Blockchain Security at Coursera Overview
Duration | 8 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Blockchain Security at Coursera Highlights
- Earn a certificate from Infosec
Reset deadlines in accordance to your schedule
Blockchain Security at Coursera Course details
- This course introduces blockchain security, including a description of how the blockchain works at each level of the blockchain ecosystem
- The course progresses with a module that describes how blocks are created, the nodes and network that make up the blockchain ecosystem, and examples of various attacks that can be made on their security
- Next the focus is on smart contracts and how their security can be compromised with vulnerabilities created by common programming errors during contract development, including in Ethereum, the most commonly used smart contract platform
- Finally, the course wraps up with discussions of distributed ledger architectures that are alternatives to blockchain, second-level blockchain protocols, and advanced cryptography in blockchain
Blockchain Security at Coursera Curriculum
Fundamentals of Blockchain Security
Welcome to blockchain security!
Fundamentals of blockchain security
What is the blockchain?
The promises of blockchain
Inside the blockchain hype
Structure of the blockchain
The blocks
The chains
What is public-key cryptography?
How does public-key cryptography work?
Public-key cryptography in the blockchain
Security assumptions of public-key cryptography
Poor random number generation
Lost/stolen private keys
Quantum computing
What is a hash function?
Properties of hash functions
Hash functions in the blockchain
Blockchain security hash key functions
Fundamentals of blockchain security recap
Fundamentals of blockchain security quiz
Consensus Algorithm Security
Consensus algorithm security overview
Why does blockchain need consensus?
The Byzantine generals problem
Security via scarcity
Common blockchain consensus algorithms
The longest chain rule
Introduction to proof of work
Inside PoW mining
Attacking PoW consensus
The 51% attack
Denial of service: artificial difficulty increases
Introduction to proof of stake
Choosing the block creator
Attacking PoS consensus
XX% attack and the PoS "timebomb"
Fake stake attacks
Long-range attacks
Nothing at stake problem
Sour milk attack
Concensus algorithm security recap
Consensus algorithm security quiz
Blockchain in Action
Blockchain in action overview
The blockchain ecosystem
Inside the node
How blocks are created
Attacking block creation
Denial-of-service attacks
Frontrunning
Selfish mining
SPV mining
Attacking blockchain nodes
Blockchain software misconfiguration
Denial of service
Malicious transactions
Attacking the blockchain network
Eclipse attack
Routing attack
Sybil attack
Blockchain in action recap
Blockchain in action quiz
Smart Contract Security
Smart contract security overview
The world computer
Smart contracts
General programming vulnerabilities
Arithmetic vulnerabilities
Arithmetic vulnerabilities code example
Right-to-left control character
Blockchain vulnerabilities
Access control
Bad randomness
Denial of service
Frontrunning vulnerabilities
Frontrunning vulnerabilities code example
Timestamp dependence
Ethereum vulnerabilities
Denial of service
Reentrancy
Reentrancy code example
Short addresses
Unchecked return values
Smart contract security recap
Smart contract security quiz
Beyond the Basics
Beyond the basics of blockchain overview
Alternative distributed ledger architectures
Introduction to DAGs
Introduction to block lattices
Introduction to sidechains
Second-level blockchain protocols
How a state channel works
Advanced cryptography in blockchain
Multisignatures
Zero-knowledge proofs
Stealth addresses
Ring signatures
Commitment schemes
Beyond the basics recap
Beyond the basics of blockchain quiz
Blockchain security cumulative quiz