Blockchain Security - Foundational Concepts
- Offered byCoursera
Blockchain Security - Foundational Concepts at Coursera Overview
Duration | 13 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Blockchain Security - Foundational Concepts at Coursera Highlights
- Earn a certificate after completion of the course
- Assessment and quizzes
- Financial aid available
Blockchain Security - Foundational Concepts at Coursera Course details
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
- Blockchain Security - Foundational Concepts is where your grand adventure begins, at the crossroads of technology and creativity. This course is designed for aspiring blockchain enthusiasts, developers, security professionals, and decision makers.
- This course isn't a mere introduction; it's an invitation to explore the world of blockchain security with an artist's flair. Beyond theory's embrace, it pulls you into a universe where cryptographic techniques, smart contract development, and secure blockchain solutions aren't just words they're a living, breathing dance guided by the hand of a master.
- After completing this course, learners will be able to grasp the core elements of blockchain technology and the security that guards them, identify common security risks, detail cryptography techniques, and more.
Blockchain Security - Foundational Concepts at Coursera Curriculum
Welcome and Module 1: Intro to Blockchain Security
Course Introduction
Introduction to Blockchain
How Blockchain Works
Blocks and Chains
The Blockchain Node
Peer-to-Peer Network
Core Features: Anonymity, Decentralization, Fault Tolerance, and Immutability
Core Features: Transparency and Trustless
Course Description
Learning Objectives & Skills
Course Outline
An Introduction to Blockchain Security Threats
Securing Blockchain Architecture - Core Principles and Best Practices
Assignment: Threat Assessment Mind Map
Module 1 Exam: Intro to Blockchain Security
Are Blockchain Networks Really Infallible?
Vulnerabilities and Countermeasures
Module 2: Cryptography, Hash Functions, and Public Key
Overview Hash Functions
Introduction to Hash Functions
Hash Functions: Collision Resistance
Cryptography in Blockchain
One Way Hash Function
Hash Functions: Large Output Space
Hash Functions: Non Locality
Hash Functions: Blockchains
Hash Functions: Merkle Trees
Hash Functions: Digital Signatures
Hash Functions: Security
Summary
Public Key Cryptography
Asymmetric Cryptography
Mathematically Hard
Hard Asymmetric Crypto
Benefits of Asymmetric Crypto
Public Key Crypto
Account Addressing
Digital Signatures
Data Encryption
Security Public Key Cryptography
Summary
LISK Case Study
Hashing and Public Keys - The Cryptographic Foundations of Blockchain
Assignment #3 Hash Function Illustration
Case Study - How LISK Leverages Cryptography for Blockchain Security
Module 2 Exam: Cryptography, Hash Functions and Public Key
Lesson 1 Quiz: Cryptography in Blockchain
Lesson 2 Quiz: Hash Functions
Lesson 3 Quiz: Public Key Cryptography
Decrypting the Real-world Applications
Module 3: Consensus, PoW, and PoS Security
Introduction to Consensus
Consensus Byzantine Generals
Security vs Scarcity
Limits Proof-of-Work
Summary
Intro Proof-of-Work
Inside Proof-of-Work
Proof-of-Work Byznatine Generals Problem
Proof-of-Work Security
Attacks on PoW: 51% and DoS
Attacks on PoW: Selfish Mining and SPV Mining
Summary
Introduction to Proof-of-Stake
Inside Proof-of-Stake
Proof-of-Stake Security
Attacks on PoS: XX% and Fake Stake Attacks
Attacks on PoS: Proof of Stake Timebomb and Long-range Attack
Attacks on PoS: Longest Chain Rule, Nothing at Stake Attack, and Sour Milk Attack
Summary
Verge Case Study Part 1
Verge Case Study Part 2
Consensus Models - Understanding Proof of Work vs. Proof of Stake Security
Case Study - The Verge 51% Attack and Blockchain Consensus Vulnerabilities
Module 3 Exam: Consensus, PoW, and PoS Security
Lesson 1 Quiz: Introduction to Consensus
Lesson 2 Quiz: Proof of Work Security
Lesson 3 Quiz: Proof of Stake Security
A Tug-of-War: PoW vs PoS
Consensus Conundrum
Module 4: Advanced Blockchain and Architectural Security
Introduction to Advanced Blockchain Security Mechanisms
Architectural Security
Public vs Private
Open vs Permissioned
Checkpointing
Advanced Cryptographic Tools
Zero Knowledge Proofs
Stealth Addresses
Ring Signatures
Securing Blockchain Smart Contracts and DApps
zk-SNARKs and the Evolution of Blockchain Privacy
Assignment #4 - Zero-Knowledge Proofs: A Deep Dive
Module 4 Exam: Advanced Blockchain and Architectural Security
Lesson 1 Quiz: Advanced Blockchain Security Mechanisms and Architectural Security
Lesson 2 Quiz: Advanced Cryptography Tools
Futureproofing Blockchain: A Pipe Dream or Reality?
Module 5: The Blockchain User & Node Security
Blockchain User and Node Security
Protocols vs. Implementation
Blockchain Node
Securing Nodes and Users
Securing Blockchain Users
Private Key Security
Exposed Mnemonic Keys
Third Party Key Storage
Non-Existent Insecure Backups
Phishing Attacks
Insecure Hardware Wallets
Signing Unverified Transactions
DeFi Approvals
Securing Blockchain Nodes
Blockchain Breakouts
Blockchain Focused Malware
Denial of Service Attacks
Missed Updates
Misconfigured Security Settings
Case Study Ethereum RPC
Course Recap
How to Secure Your Blockchain Wallet and Transactions
Hardening Blockchain Nodes Against Attack
Module 5 Exam: The Blockchain User & Node Security
Course Final Exam
Lesson 1 Quiz: Blockchain User and Node Security
Lesson 2 Quiz: Securing Blockchain User
Lesson 3 Quiz: Securing Blockchain Node
Blockchain Users and Nodes
The Blockchain User and Node