Chapter 1: Fundamental Blockchain Security |
- Cryptography for the Blockchain
- Hash Functions
- Public Key Cryptography
- Elliptic Curve Cryptography
- A Brief Introduction to the Blockchain
- The Blocks
- The Chains
- The Network
- Promises of the Blockchain
- Blockchain Security Assumptions
- Attacking Basic Blockchain Security
- Chapter Quiz
- Chapter Quiz Answer Key
|
Chapter 2: Consensus in the Blockchain |
- Blockchain Consensus and the Byzantine Generals
- Introduction to Blockchain Consensus Security
- Proof of Work
- Solving BGP with PoW
- Security of PoW
- Attacking PoW
- Proof of Stake
- Solving BGP with PoS
- Security of PoS
- Attacking PoS
- Other Blockchain Consensus Algorithms
- Chapter Quiz
- Chapter Quiz Answer Key
|
Chapter 3: Advanced Blockchain Security Mechanisms |
- Advanced Cryptographic Solutions
- Multisignatures
- Zero-Knowledge Proofs
- Stealth Addresses
- Ring Signatures
- Confidential Transactions
- Chapter Quiz
- Chapter Quiz Answer Key
|
Chapter 4: Smart Contract Security |
- Introduction to Smart Contracts
- Smart Contract Security Considerations
- Turing-Completeness
- Untrusted Code
- Smart Contract Lifetimes
- External Interfaces
- Smart Contract Code Auditing
- Auditing Smart Contracts
- Chapter Quiz
- Chapter Quiz Answer Key
|
Chapter 5: Blockchain Risk Assessment |
- Blockchain Risk Considerations
- Decentralization
- Distributed Ledger
- Distributed Infrastructure
- Smart Contracts
- Visibility
- Regulatory Requirements
- Blockchain Architectural Design
- Private vs Public Blockchains
- Permissioned vs Open Blockchains
- Chapter Quiz
- Chapter Quiz Answer Key
|
Chapter 6: Basic Blockchain Security |
- User Security
- Failure to Protect Private Keys
- Vulnerability to Malware
- Failure to Update
- Node Security
- Shared Vulnerabilities
- Misconfigured Membership Service Providers
- Insecure API Connections
- Network Security
- Flawed Network Design
- Poor Network Security
- Chapter Quiz
- Chapter Quiz Answer Key
|
Chapter 7: Blockchain for Business |
- Introduction to Ethereum Security
- The Ethereum Distributed Ledger
- Ethereum Smart Contracts
- Ethereum Security Measures
- Introduction to Hyperledger Security
- The Hyperledger Distributed Ledger
- Hyperledger Smart Contracts
- Hyperledger Security Measures
- Introduction to Corda Security
- The Corda Distributed Ledger
- Smart Contracts in Corda
- Corda Security Measures
- Chapter Quiz
- Chapter Quiz Answer Key
|
Chapter 8: Securely Implementing Business Blockchains |
- Business Operations
- Business Continuity/Disaster Recovery
- Contract Management
- Product Distribution
- Product Monetization
- Data Management
- Access Control
- Data Retention and Deletion
- Infrastructure
- Asset Management
- Infrastructure Scalability
- Secure Communications
- Legal and Regulatory Compliance
- Data Control
- Data Security
- Transparency
- Chapter Quiz
- Chapter Quiz Answer Key
|
Chapter 9: Network-Level Vulnerabilities and Attacks |
- % Attacks
- Denial of Service Attacks
- Eclipse Attacks
- Replay Attacks
- Routing Attacks
- Sybil Attacks
- Chapter Quiz
- Chapter Quiz Answer Key
|
Chapter 10: System-Level Vulnerabilities and Attacks |
- The Bitcoin Hack
- The Verge Hack
- The EOS Vulnerability
- The Lisk Vulnerability
- The Pigeoncoin (Bitcoin Core) Hack
- The SPV Mining Exploit
- Chapter Quiz
- Chapter Quiz Answer Key
|
Chapter 11: Smart Contract Vulnerabilities and Attacks |
- Reentrancy
- Access Control
- Arithmetic
- Unchecked Return Value
- Denial of Service
- Bad Randomness
- Race Conditions
- Timestamp Dependence
- Short Addresses
- Chapter Quiz
- Chapter Quiz Answer Key
|
Chapter 12: Security of Alternative DLT Architectures |
- Introduction to Directed Acyclic Graphs (DAGs)
- Transactions in a DAG
- Advantages and Disadvantages of DAGs
- Blockchain Extensions
- Lightning Network
- Sidechains
- Chapter Quiz
- Chapter Quiz Answer Key
|
Official Information |
https://blockchaintrainingalliance.com/products/cbsp |