Coursera
Coursera Logo

Blockchain Security - Foundational Concepts 

  • Offered byCoursera

Blockchain Security - Foundational Concepts
 at 
Coursera 
Overview

Duration

13 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Blockchain Security - Foundational Concepts
 at 
Coursera 
Highlights

  • Earn a certificate after completion of the course
  • Assessment and quizzes
  • Financial aid available
Details Icon

Blockchain Security - Foundational Concepts
 at 
Coursera 
Course details

Skills you will learn
What are the course deliverables?
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
More about this course
  • Blockchain Security - Foundational Concepts is where your grand adventure begins, at the crossroads of technology and creativity. This course is designed for aspiring blockchain enthusiasts, developers, security professionals, and decision makers.
  • This course isn't a mere introduction; it's an invitation to explore the world of blockchain security with an artist's flair. Beyond theory's embrace, it pulls you into a universe where cryptographic techniques, smart contract development, and secure blockchain solutions aren't just words they're a living, breathing dance guided by the hand of a master.
  • After completing this course, learners will be able to grasp the core elements of blockchain technology and the security that guards them, identify common security risks, detail cryptography techniques, and more.
Read more

Blockchain Security - Foundational Concepts
 at 
Coursera 
Curriculum

Welcome and Module 1: Intro to Blockchain Security

Course Introduction

Introduction to Blockchain

How Blockchain Works

Blocks and Chains

The Blockchain Node

Peer-to-Peer Network

Core Features: Anonymity, Decentralization, Fault Tolerance, and Immutability

Core Features: Transparency and Trustless

Course Description

Learning Objectives & Skills

Course Outline

An Introduction to Blockchain Security Threats

Securing Blockchain Architecture - Core Principles and Best Practices

Assignment: Threat Assessment Mind Map

Module 1 Exam: Intro to Blockchain Security

Are Blockchain Networks Really Infallible?

Vulnerabilities and Countermeasures

Module 2: Cryptography, Hash Functions, and Public Key

Overview Hash Functions

Introduction to Hash Functions

Hash Functions: Collision Resistance

Cryptography in Blockchain

One Way Hash Function

Hash Functions: Large Output Space

Hash Functions: Non Locality

Hash Functions: Blockchains

Hash Functions: Merkle Trees

Hash Functions: Digital Signatures

Hash Functions: Security

Summary

Public Key Cryptography

Asymmetric Cryptography

Mathematically Hard

Hard Asymmetric Crypto

Benefits of Asymmetric Crypto

Public Key Crypto

Account Addressing

Digital Signatures

Data Encryption

Security Public Key Cryptography

Summary

LISK Case Study

Hashing and Public Keys - The Cryptographic Foundations of Blockchain

Assignment #3 Hash Function Illustration

Case Study - How LISK Leverages Cryptography for Blockchain Security

Module 2 Exam: Cryptography, Hash Functions and Public Key

Lesson 1 Quiz: Cryptography in Blockchain

Lesson 2 Quiz: Hash Functions

Lesson 3 Quiz: Public Key Cryptography

Decrypting the Real-world Applications

Module 3: Consensus, PoW, and PoS Security

Introduction to Consensus

Consensus Byzantine Generals

Security vs Scarcity

Limits Proof-of-Work

Summary

Intro Proof-of-Work

Inside Proof-of-Work

Proof-of-Work Byznatine Generals Problem

Proof-of-Work Security

Attacks on PoW: 51% and DoS

Attacks on PoW: Selfish Mining and SPV Mining

Summary

Introduction to Proof-of-Stake

Inside Proof-of-Stake

Proof-of-Stake Security

Attacks on PoS: XX% and Fake Stake Attacks

Attacks on PoS: Proof of Stake Timebomb and Long-range Attack

Attacks on PoS: Longest Chain Rule, Nothing at Stake Attack, and Sour Milk Attack

Summary

Verge Case Study Part 1

Verge Case Study Part 2

Consensus Models - Understanding Proof of Work vs. Proof of Stake Security

Case Study - The Verge 51% Attack and Blockchain Consensus Vulnerabilities

Module 3 Exam: Consensus, PoW, and PoS Security

Lesson 1 Quiz: Introduction to Consensus

Lesson 2 Quiz: Proof of Work Security

Lesson 3 Quiz: Proof of Stake Security

A Tug-of-War: PoW vs PoS

Consensus Conundrum

Module 4: Advanced Blockchain and Architectural Security

Introduction to Advanced Blockchain Security Mechanisms

Architectural Security

Public vs Private

Open vs Permissioned

Checkpointing

Advanced Cryptographic Tools

Zero Knowledge Proofs

Stealth Addresses

Ring Signatures

Securing Blockchain Smart Contracts and DApps

zk-SNARKs and the Evolution of Blockchain Privacy

Assignment #4 - Zero-Knowledge Proofs: A Deep Dive

Module 4 Exam: Advanced Blockchain and Architectural Security

Lesson 1 Quiz: Advanced Blockchain Security Mechanisms and Architectural Security

Lesson 2 Quiz: Advanced Cryptography Tools

Futureproofing Blockchain: A Pipe Dream or Reality?

Module 5: The Blockchain User & Node Security

Blockchain User and Node Security

Protocols vs. Implementation

Blockchain Node

Securing Nodes and Users

Securing Blockchain Users

Private Key Security

Exposed Mnemonic Keys

Third Party Key Storage

Non-Existent Insecure Backups

Phishing Attacks

Insecure Hardware Wallets

Signing Unverified Transactions

DeFi Approvals

Securing Blockchain Nodes

Blockchain Breakouts

Blockchain Focused Malware

Denial of Service Attacks

Missed Updates

Misconfigured Security Settings

Case Study Ethereum RPC

Course Recap

How to Secure Your Blockchain Wallet and Transactions

Hardening Blockchain Nodes Against Attack

Module 5 Exam: The Blockchain User & Node Security

Course Final Exam

Lesson 1 Quiz: Blockchain User and Node Security

Lesson 2 Quiz: Securing Blockchain User

Lesson 3 Quiz: Securing Blockchain Node

Blockchain Users and Nodes

The Blockchain User and Node

Blockchain Security - Foundational Concepts
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Blockchain Security - Foundational Concepts
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...