Coursera
Coursera Logo

Blockchain Security - Intermediate Practices 

  • Offered byCoursera

Blockchain Security - Intermediate Practices
 at 
Coursera 
Overview

Duration

21 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Blockchain Security - Intermediate Practices
 at 
Coursera 
Highlights

  • Earn a certificate after completion of the course
  • Assessment and quizzes
  • Financial aid available
Details Icon

Blockchain Security - Intermediate Practices
 at 
Coursera 
Course details

More about this course
  • This course is intended for blockchain innovators, developers, security analysts, and business leaders seeking to build or enhance secure blockchain networks. With Blockchain Security Foundational Concepts, as its muse, the Blockchain Security Intermediate Practices course journeys through uncharted realms of blockchain exploration, thrilling, intricate, and alluring. Advanced security practices, cryptography, consensus models, and network security are woven together in a harmonious ballet, punctuated by real-world case studies. This course is more than an intellectual dance; it's a challenge and an awakening to the sublime world of blockchain security.
  • Upon completing the course, learners will understand the complexity of cryptographic techniques including has functions and public key cryptography. Learners will also be able to engage with the blockchain security mechanisms, PoW and PoS, safeguard users and nodes, and analyze case studies.
Read more

Blockchain Security - Intermediate Practices
 at 
Coursera 
Curriculum

Welcome & Module 1: Securing Blockchain Networks

Introduction to Securing the Blockchain Network

Blockchain Peer-to-Peer Network

Attack the Blockchain Network

Denial of Service Attacks

Eclipse / Routing Attacks

Eclipse vs Routing Attacks

Sybil Attack

Summary

Course Description

Learning Objectives & Skills

Course Outline

The Keys to the Blockchain Kingdom: Network Encryption and Node Security

A Taxonomy of Blockchain Threats and Vulnerabilities

Module 1 Exam: Securing Blockchain Networks

Are Blockchain Networks Really Infallible?

Securing Blockchain Networks

Module 2: Introduction to Smart Contract Security

Introduction to Smart Contract Security

Introduction to Smart Contracts

Smart Contract Security

Summary

Building a Digital Fortress: Secure Smart Contract Development and Auditing

Assignment: Vulnerable Smart Contract Assignment

Lesson 1 Quiz: Smart Contract Security

Smart Contracts: Treasure Chests or Trojan Horses?

Module 3: Programming Vulnerabilities

General Programming Vulnerabilities

Arithmetic Vulnerabilities

Integer Underflow Example

Case Study: PizzaHack

Mitigating Arithmetic Vulnerabilities

External Library Functions

Case Study: Parity Wallet

Mitigating External Library Vulnerabilities

Right to Left Control Characters

Right to Left Control Example

Mitigating Right to Left Control Vulnerabilities

Recap

Blockchain Cyber Security Vulnerabilities and Potential Countermeasures

Assignment: External Library Functions & Arithmetic Vulnerabilities

Down the Rabbit Hole: Common Programming Pitfalls in Blockchain

The Devil in the Details: Recapping Programming Vulnerabilities in Blockchain

An Empirical Study of Blockchain Systems Vulnerabilities Modules Types and Patterns

Module 3 Exam: Programming Vulnerabilities

Lesson 1 Quiz: General Program Vulnerabilities

Lesson 2 Quiz: External Library Functions

Lesson 3 Quiz: Right to Left Control

The Devil’s Playground: Traps and Pitfalls in Programming

Programming Vulnerabilities

Module 4: Blockchain Specific Vulnerabilities

Blockchain Specific Vulnerabilities

Access Control Vulnerabilities

Access Control Vulnerabilities continued

Case Study: Poly Network

Mitigating Access Control Vulnerabilities

Denial of Service

Case Study: Sia

Mitigating Denial of Service Vulnerabilties

Introduction to Frontrunning

Frontrunning Transactions

Frontrunning Example

Case Study: Dodo Punk Protocol

Mitigating Frontrunning Vulnerabilities

Introduction to Rollback Attacks

Case Study: EOSIO Rollback Attack

Rollback Attack Mitigation

Time Stamp Dependence

Time Stamp Example

Case Study: GovernMental

Mitigating Timestamp Dependencies

Introduction to Weak Randomness

Weak Randomness - Continued

Weak Randomness Example

Case Study: Smart Billions Lottery

Mitigating Weak Randomness Vulnerabilities

Recap

Journey to the Center of the Blockchain: Access Control Weaknesses

Assignment: Unveiling Access Control Vulnerabilities

Denial of Service and Frontrunning: Unique Threats in Blockchain Architecture

Assignment: Unraveling the Enigma of Frontrunning in Blockchain

The Blockchain's Underbelly: Timestamp Dependence, Weak Randomness, and Other Lurking Threats

Assignment: Navigating the Labyrinth of Time Stamp Dependence in Blockchain

Module 4 Exam: Blockchain Specific Vulnerabilities

Lesson 1 Quiz: Blockchain Specific Vulnerabilities

Lesson 2 Quiz: Denial of Service

Lesson 3 Quiz: Frontrunning

Lesson 4 Quiz: Introduction to Rollback Attacks

Lesson 5 Quiz: Time Stamp Dependence

Lesson 6 Quiz: Introduction to Weak Randomness

A Maze of Mayhem: Navigating Blockchain-Specific Vulnerabilities

Module 5: Ethereum Specific Vulnerabilities

Ethereum Specific Vulnerabilities

Ethereum Block Gas Limits

Ethereum Block Gas Limits Denial of Service Example

Case Study: GovernMental

Mitigating Ethereum Block Gas Limit DoS Vulnerabilities

Introduction to Unexpected Revert

Unexpected Revert Example

Case Study: KingEther

Mitigating Unexpected Revert Vulnerabilities

Introduction to Forced Send Ether

Forced Send Ether Example

Case Study: Edgeware

Mitigating Forced Send Ether Vulnerabilities

Introduction to Reentrancy

Reentrancy Vulnerability Example

Case Study: The DAO

Mitigating Reentrancy Vulnerabilities

Introduction to Short Addresses

Short Addresses Example

Mitigating Short Addresses Vulnerabilities

Introduction to Unchecked Return Values

Unchecked Return Values Example

Case Study: ForceDAO

Mitigating Return Values Vulnerabilities

Introduction to Unsafe External Calls

Unsafe External Calls Example

Case Study: Furucombo

Mitigating Unsafe External Call Vulnerabilities

Course Recap

At the Summit: Block Gas Limits and Unexpected Revert Risks in Ethereum

Assignment: Decoding the Mystery of Unexpected Revert in Ethereum

Venturing into Ethereum's Dark Forest: Reentrancy, Short Addresses, and More

Assignment: Reentrancy: The Recursive Demon in Smart Contracts

Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract

A Survey on Ethereum Systems Security Vulnerabilities Attacks and Defenses

The Ethereum Security Panorama: A Recap of Key Risks and Safeguards

Module 5 Exam: Ethereum Specific Vulnerabilities

Course Final Exam

Lesson 1 Quiz: Introduction to Ethereum Mistakes and Ethereum Block Gas Limits

Lesson 2 Quiz: Introduction to Unexpected Revert

Lesson 3 Quiz: Introduction to Forced Send Ether

Lesson 4 Quiz : Introduction to Reentrancy

Lesson 5 Quiz: Introduction to Short Addresses

Lesson 6 Quiz: Introduction to Unchecked Return Values

Lesson 7 Quiz: Introduction to Unsafe External Calls

Ethereum: The Double-Edged Sword of Popularity

Ethereum Specific Vulnerabilities

Blockchain Security - Intermediate Practices
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Blockchain Security - Intermediate Practices
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...