Blockchain Security - Intermediate Practices
- Offered byCoursera
Blockchain Security - Intermediate Practices at Coursera Overview
Duration | 21 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Blockchain Security - Intermediate Practices at Coursera Highlights
- Earn a certificate after completion of the course
- Assessment and quizzes
- Financial aid available
Blockchain Security - Intermediate Practices at Coursera Course details
- This course is intended for blockchain innovators, developers, security analysts, and business leaders seeking to build or enhance secure blockchain networks. With Blockchain Security Foundational Concepts, as its muse, the Blockchain Security Intermediate Practices course journeys through uncharted realms of blockchain exploration, thrilling, intricate, and alluring. Advanced security practices, cryptography, consensus models, and network security are woven together in a harmonious ballet, punctuated by real-world case studies. This course is more than an intellectual dance; it's a challenge and an awakening to the sublime world of blockchain security.
- Upon completing the course, learners will understand the complexity of cryptographic techniques including has functions and public key cryptography. Learners will also be able to engage with the blockchain security mechanisms, PoW and PoS, safeguard users and nodes, and analyze case studies.
Blockchain Security - Intermediate Practices at Coursera Curriculum
Welcome & Module 1: Securing Blockchain Networks
Introduction to Securing the Blockchain Network
Blockchain Peer-to-Peer Network
Attack the Blockchain Network
Denial of Service Attacks
Eclipse / Routing Attacks
Eclipse vs Routing Attacks
Sybil Attack
Summary
Course Description
Learning Objectives & Skills
Course Outline
The Keys to the Blockchain Kingdom: Network Encryption and Node Security
A Taxonomy of Blockchain Threats and Vulnerabilities
Module 1 Exam: Securing Blockchain Networks
Are Blockchain Networks Really Infallible?
Securing Blockchain Networks
Module 2: Introduction to Smart Contract Security
Introduction to Smart Contract Security
Introduction to Smart Contracts
Smart Contract Security
Summary
Building a Digital Fortress: Secure Smart Contract Development and Auditing
Assignment: Vulnerable Smart Contract Assignment
Lesson 1 Quiz: Smart Contract Security
Smart Contracts: Treasure Chests or Trojan Horses?
Module 3: Programming Vulnerabilities
General Programming Vulnerabilities
Arithmetic Vulnerabilities
Integer Underflow Example
Case Study: PizzaHack
Mitigating Arithmetic Vulnerabilities
External Library Functions
Case Study: Parity Wallet
Mitigating External Library Vulnerabilities
Right to Left Control Characters
Right to Left Control Example
Mitigating Right to Left Control Vulnerabilities
Recap
Blockchain Cyber Security Vulnerabilities and Potential Countermeasures
Assignment: External Library Functions & Arithmetic Vulnerabilities
Down the Rabbit Hole: Common Programming Pitfalls in Blockchain
The Devil in the Details: Recapping Programming Vulnerabilities in Blockchain
An Empirical Study of Blockchain Systems Vulnerabilities Modules Types and Patterns
Module 3 Exam: Programming Vulnerabilities
Lesson 1 Quiz: General Program Vulnerabilities
Lesson 2 Quiz: External Library Functions
Lesson 3 Quiz: Right to Left Control
The Devil’s Playground: Traps and Pitfalls in Programming
Programming Vulnerabilities
Module 4: Blockchain Specific Vulnerabilities
Blockchain Specific Vulnerabilities
Access Control Vulnerabilities
Access Control Vulnerabilities continued
Case Study: Poly Network
Mitigating Access Control Vulnerabilities
Denial of Service
Case Study: Sia
Mitigating Denial of Service Vulnerabilties
Introduction to Frontrunning
Frontrunning Transactions
Frontrunning Example
Case Study: Dodo Punk Protocol
Mitigating Frontrunning Vulnerabilities
Introduction to Rollback Attacks
Case Study: EOSIO Rollback Attack
Rollback Attack Mitigation
Time Stamp Dependence
Time Stamp Example
Case Study: GovernMental
Mitigating Timestamp Dependencies
Introduction to Weak Randomness
Weak Randomness - Continued
Weak Randomness Example
Case Study: Smart Billions Lottery
Mitigating Weak Randomness Vulnerabilities
Recap
Journey to the Center of the Blockchain: Access Control Weaknesses
Assignment: Unveiling Access Control Vulnerabilities
Denial of Service and Frontrunning: Unique Threats in Blockchain Architecture
Assignment: Unraveling the Enigma of Frontrunning in Blockchain
The Blockchain's Underbelly: Timestamp Dependence, Weak Randomness, and Other Lurking Threats
Assignment: Navigating the Labyrinth of Time Stamp Dependence in Blockchain
Module 4 Exam: Blockchain Specific Vulnerabilities
Lesson 1 Quiz: Blockchain Specific Vulnerabilities
Lesson 2 Quiz: Denial of Service
Lesson 3 Quiz: Frontrunning
Lesson 4 Quiz: Introduction to Rollback Attacks
Lesson 5 Quiz: Time Stamp Dependence
Lesson 6 Quiz: Introduction to Weak Randomness
A Maze of Mayhem: Navigating Blockchain-Specific Vulnerabilities
Module 5: Ethereum Specific Vulnerabilities
Ethereum Specific Vulnerabilities
Ethereum Block Gas Limits
Ethereum Block Gas Limits Denial of Service Example
Case Study: GovernMental
Mitigating Ethereum Block Gas Limit DoS Vulnerabilities
Introduction to Unexpected Revert
Unexpected Revert Example
Case Study: KingEther
Mitigating Unexpected Revert Vulnerabilities
Introduction to Forced Send Ether
Forced Send Ether Example
Case Study: Edgeware
Mitigating Forced Send Ether Vulnerabilities
Introduction to Reentrancy
Reentrancy Vulnerability Example
Case Study: The DAO
Mitigating Reentrancy Vulnerabilities
Introduction to Short Addresses
Short Addresses Example
Mitigating Short Addresses Vulnerabilities
Introduction to Unchecked Return Values
Unchecked Return Values Example
Case Study: ForceDAO
Mitigating Return Values Vulnerabilities
Introduction to Unsafe External Calls
Unsafe External Calls Example
Case Study: Furucombo
Mitigating Unsafe External Call Vulnerabilities
Course Recap
At the Summit: Block Gas Limits and Unexpected Revert Risks in Ethereum
Assignment: Decoding the Mystery of Unexpected Revert in Ethereum
Venturing into Ethereum's Dark Forest: Reentrancy, Short Addresses, and More
Assignment: Reentrancy: The Recursive Demon in Smart Contracts
Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract
A Survey on Ethereum Systems Security Vulnerabilities Attacks and Defenses
The Ethereum Security Panorama: A Recap of Key Risks and Safeguards
Module 5 Exam: Ethereum Specific Vulnerabilities
Course Final Exam
Lesson 1 Quiz: Introduction to Ethereum Mistakes and Ethereum Block Gas Limits
Lesson 2 Quiz: Introduction to Unexpected Revert
Lesson 3 Quiz: Introduction to Forced Send Ether
Lesson 4 Quiz : Introduction to Reentrancy
Lesson 5 Quiz: Introduction to Short Addresses
Lesson 6 Quiz: Introduction to Unchecked Return Values
Lesson 7 Quiz: Introduction to Unsafe External Calls
Ethereum: The Double-Edged Sword of Popularity
Ethereum Specific Vulnerabilities