This course is intended for blockchain innovators, developers, security analysts, and business leaders seeking to build or enhance secure blockchain networks. With Blockchain Security Foundational Concepts, as its muse, the Blockchain Security Intermediate Practices course journeys through uncharted realms of blockchain exploration, thrilling, intricate, and alluring. Advanced security practices, cryptography, consensus models, and network security are woven together in a harmonious ballet, punctuated by real-world case studies. This course is more than an intellectual dance; it's a challenge and an awakening to the sublime world of blockchain security.

Blockchain Security - Intermediate Practices
本课程是 Security for Blockchain and DApps 专项课程 的一部分
访问权限由 New York State Department of Labor 提供
推荐体验
推荐体验
高级
Prior to taking this course, learners should understand the Blockchain Security Foundational Concepts or have equivalent knowledge.
推荐体验
推荐体验
高级
Prior to taking this course, learners should understand the Blockchain Security Foundational Concepts or have equivalent knowledge.
要了解的详细信息

添加到您的领英档案
27 项作业
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有5个模块
Welcome to Blockchain Security Intermediate Practices! Unveil the keys to the digital fortress that is the blockchain network. This module acquaints you with the high art of defending the blockchain's foundational layers—because even the most avant-garde systems must stand on secure ground. Topics include network encryption, node security, and the intricacies of guarding against Sybil attacks.
涵盖的内容
8个视频6篇阅读材料2个作业1个讨论话题1个插件
8个视频• 总计22分钟
- Introduction to Securing the Blockchain Network• 1分钟
- Blockchain Peer-to-Peer Network• 3分钟
- Attack the Blockchain Network• 2分钟
- Denial of Service Attacks• 3分钟
- Eclipse / Routing Attacks• 6分钟
- Eclipse vs Routing Attacks• 3分钟
- Sybil Attack• 3分钟
- Summary• 1分钟
6篇阅读材料• 总计36分钟
- Course Description• 1分钟
- Learning Objectives & Skills• 1分钟
- Course Outline• 3分钟
- The Keys to the Blockchain Kingdom: Network Encryption and Node Security• 9分钟
- A Taxonomy of Blockchain Threats and Vulnerabilities• 12分钟
- Use Case Story as Exam Review: Securing Blockchain Networks• 10分钟
2个作业• 总计35分钟
- Module 1 Exam: Securing Blockchain Networks• 30分钟
- Securing Blockchain Networks Knowledge Check• 5分钟
1个讨论话题• 总计15分钟
- Are Blockchain Networks Really Infallible?• 15分钟
1个插件• 总计15分钟
- Securing Blockchain Networks• 15分钟
This module serves as an introduction to the security considerations that are unique to smart contracts in blockchain systems. It aims to equip learners with the principles of secure smart contract development, including best practices for auditing. Emphasis will be placed on balancing contract functionality with security requirements.
涵盖的内容
4个视频3篇阅读材料1个作业1个讨论话题
4个视频• 总计11分钟
- Introduction to Smart Contract Security• 0分钟
- Introduction to Smart Contracts• 5分钟
- Smart Contract Security• 5分钟
- Summary• 1分钟
3篇阅读材料• 总计79分钟
- Use Case Story: Smart Contract Security• 10分钟
- Building a Digital Fortress: Secure Smart Contract Development and Auditing• 9分钟
- Assignment: Vulnerable Smart Contract Assignment• 60分钟
1个作业• 总计10分钟
- Lesson 1 Quiz: Smart Contract Security• 10分钟
1个讨论话题• 总计15分钟
- Smart Contracts: Treasure Chests or Trojan Horses?• 15分钟
This module addresses the general vulnerabilities commonly encountered in programming practices and specifically targets their implications in the realm of blockchain. Topics covered will include arithmetic vulnerabilities, dependencies on external libraries, and issues arising from Right-to-Left Control, among others.
涵盖的内容
12个视频7篇阅读材料5个作业1个讨论话题1个插件
12个视频• 总计37分钟
- General Programming Vulnerabilities• 2分钟
- Arithmetic Vulnerabilities• 4分钟
- Integer Underflow Example• 4分钟
- Case Study: PizzaHack• 2分钟
- Mitigating Arithmetic Vulnerabilities• 4分钟
- External Library Functions• 3分钟
- Case Study: Parity Wallet• 5分钟
- Mitigating External Library Vulnerabilities• 3分钟
- Right to Left Control Characters• 3分钟
- Right to Left Control Example• 3分钟
- Mitigating Right to Left Control Vulnerabilities• 2分钟
- Recap• 3分钟
7篇阅读材料• 总计68分钟
- Blockchain Cyber Security Vulnerabilities and Potential Countermeasures• 12分钟
- Assignment: External Library Functions & Arithmetic Vulnerabilities• 7分钟
- Use Case Story: Right to Left Control• 10分钟
- Use Case Story as Exam Review: Programming Vulnerabilities• 10分钟
- Down the Rabbit Hole: Common Programming Pitfalls in Blockchain• 8分钟
- The Devil in the Details: Recapping Programming Vulnerabilities in Blockchain• 9分钟
- An Empirical Study of Blockchain Systems Vulnerabilities Modules Types and Patterns• 12分钟
5个作业• 总计55分钟
- Module 3 Exam: Programming Vulnerabilities • 30分钟
- Lesson 1 Quiz: General Program Vulnerabilities• 5分钟
- Lesson 2 Quiz: External Library Functions• 5分钟
- Lesson 3 Quiz: Right to Left Control• 5分钟
- Programming Vulnerabilities Knowledge Check• 10分钟
1个讨论话题• 总计15分钟
- The Devil’s Playground: Traps and Pitfalls in Programming• 15分钟
1个插件• 总计15分钟
- Programming Vulnerabilities• 15分钟
This module delves into the vulnerabilities that are specific to blockchain technologies. It discusses unique threat vectors such as access control vulnerabilities, denial-of-service attacks, frontrunning, and more. The module aims to equip learners with specialized knowledge to build secure, blockchain-specific architectures.
涵盖的内容
26个视频9篇阅读材料8个作业2个讨论话题
26个视频• 总计76分钟
- Blockchain Specific Vulnerabilities • 2分钟
- Access Control Vulnerabilities • 3分钟
- Access Control Vulnerabilities continued• 3分钟
- Case Study: Poly Network• 3分钟
- Mitigating Access Control Vulnerabilities• 3分钟
- Denial of Service• 7分钟
- Case Study: Sia• 1分钟
- Mitigating Denial of Service Vulnerabilties• 3分钟
- Introduction to Frontrunning• 6分钟
- Frontrunning Transactions• 1分钟
- Frontrunning Example• 2分钟
- Case Study: Dodo Punk Protocol• 3分钟
- Mitigating Frontrunning Vulnerabilities• 2分钟
- Introduction to Rollback Attacks• 3分钟
- Case Study: EOSIO Rollback Attack• 2分钟
- Rollback Attack Mitigation• 3分钟
- Time Stamp Dependence• 3分钟
- Time Stamp Example• 2分钟
- Case Study: GovernMental• 2分钟
- Mitigating Timestamp Dependencies• 4分钟
- Introduction to Weak Randomness• 4分钟
- Weak Randomness - Continued• 4分钟
- Weak Randomness Example• 3分钟
- Case Study: Smart Billions Lottery• 3分钟
- Mitigating Weak Randomness Vulnerabilities• 2分钟
- Recap• 2分钟
9篇阅读材料• 总计331分钟
- Journey to the Center of the Blockchain: Access Control Weaknesses• 11分钟
- Assignment: Unveiling Access Control Vulnerabilities• 90分钟
- Use Case Story: DoS• 10分钟
- Denial of Service and Frontrunning: Unique Threats in Blockchain Architecture• 10分钟
- Assignment: Unraveling the Enigma of Frontrunning in Blockchain• 90分钟
- Use Case Story: Rollback Attacks• 10分钟
- The Blockchain's Underbelly: Timestamp Dependence, Weak Randomness, and Other Lurking Threats• 10分钟
- Assignment: Navigating the Labyrinth of Time Stamp Dependence in Blockchain• 90分钟
- Use Case Story as Exam Review: Blockchain Specific Vulnerabilities• 10分钟
8个作业• 总计75分钟
- Module 4 Exam: Blockchain Specific Vulnerabilities• 30分钟
- Lesson 1 Quiz: Blockchain Specific Vulnerabilities• 5分钟
- Lesson 2 Quiz: Denial of Service• 5分钟
- Lesson 3 Quiz: Frontrunning• 5分钟
- Lesson 4 Quiz: Introduction to Rollback Attacks• 5分钟
- Lesson 5 Quiz: Time Stamp Dependence• 5分钟
- Lesson 6 Quiz: Introduction to Weak Randomness• 5分钟
- Blockchain Specific Vulnerabilities: Knowledge Check • 15分钟
2个讨论话题• 总计25分钟
- Timestamp Dependence• 10分钟
- A Maze of Mayhem: Navigating Blockchain-Specific Vulnerabilities• 15分钟
The focus of this module is on vulnerabilities that are particular to Ethereum, one of the most widely used blockchain platforms. Topics will include, but are not limited to, vulnerabilities arising from block gas limits, forced sending of Ether, and unchecked return values. Special attention will be given to Ethereum's specific architecture and its associated security considerations.
涵盖的内容
29个视频8篇阅读材料11个作业2个讨论话题1个插件
29个视频• 总计82分钟
- Ethereum Specific Vulnerabilities• 2分钟
- Ethereum Block Gas Limits• 4分钟
- Ethereum Block Gas Limits Denial of Service Example• 3分钟
- Case Study: GovernMental• 2分钟
- Mitigating Ethereum Block Gas Limit DoS Vulnerabilities• 3分钟
- Introduction to Unexpected Revert• 3分钟
- Unexpected Revert Example• 3分钟
- Case Study: KingEther• 2分钟
- Mitigating Unexpected Revert Vulnerabilities• 1分钟
- Introduction to Forced Send Ether• 4分钟
- Forced Send Ether Example• 2分钟
- Case Study: Edgeware• 3分钟
- Mitigating Forced Send Ether Vulnerabilities• 4分钟
- Introduction to Reentrancy• 2分钟
- Reentrancy Vulnerability Example• 6分钟
- Case Study: The DAO• 4分钟
- Mitigating Reentrancy Vulnerabilities• 2分钟
- Introduction to Short Addresses• 4分钟
- Short Addresses Example• 5分钟
- Mitigating Short Addresses Vulnerabilities• 2分钟
- Introduction to Unchecked Return Values• 3分钟
- Unchecked Return Values Example• 2分钟
- Case Study: ForceDAO• 3分钟
- Mitigating Return Values Vulnerabilities• 2分钟
- Introduction to Unsafe External Calls• 3分钟
- Unsafe External Calls Example• 2分钟
- Case Study: Furucombo• 3分钟
- Mitigating Unsafe External Call Vulnerabilities• 2分钟
- Course Recap• 3分钟
8篇阅读材料• 总计240分钟
- At the Summit: Block Gas Limits and Unexpected Revert Risks in Ethereum• 8分钟
- Assignment: Decoding the Mystery of Unexpected Revert in Ethereum• 90分钟
- Venturing into Ethereum's Dark Forest: Reentrancy, Short Addresses, and More• 9分钟
- Assignment: Reentrancy: The Recursive Demon in Smart Contracts• 90分钟
- Use Case Story as Exam Review: Ethereum Specific Vulnerabilities• 10分钟
- Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract• 13分钟
- A Survey on Ethereum Systems Security Vulnerabilities Attacks and Defenses• 11分钟
- The Ethereum Security Panorama: A Recap of Key Risks and Safeguards• 9分钟
11个作业• 总计120分钟
- Module 5 Exam: Ethereum Specific Vulnerabilities• 30分钟
- Course Final Exam• 30分钟
- Lesson 1 Quiz: Introduction to Ethereum Mistakes and Ethereum Block Gas Limits• 5分钟
- Lesson 2 Quiz: Introduction to Unexpected Revert• 5分钟
- Lesson 3 Quiz: Introduction to Forced Send Ether• 5分钟
- Lesson 4 Quiz : Introduction to Reentrancy• 5分钟
- Lesson 5 Quiz: Introduction to Short Addresses• 5分钟
- Lesson 6 Quiz: Introduction to Unchecked Return Values• 5分钟
- Lesson 7 Quiz: Introduction to Unsafe External Calls• 5分钟
- Ethereum Specific Vulnerabilities Knowledge Check• 10分钟
- Blockchain Security Practices Knowledge Check• 15分钟
2个讨论话题• 总计25分钟
- Key Challenges in Ethereum Smart Contract Security• 10分钟
- Ethereum: The Double-Edged Sword of Popularity• 15分钟
1个插件• 总计15分钟
- Ethereum Specific Vulnerabilities• 15分钟
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方

提供方

LearnQuest is the preferred training partner to the world’s leading companies, organizations, and government agencies. Our team boasts 20+ years of experience designing, developing and delivering a full suite industry-leading technology education classes and training solutions across the globe. Our trainers, equipped with expert industry experience and an unparalleled commitment to quality, facilitate classes that are offered in various delivery formats so our clients can obtain the training they need when and where they need it.
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
从 Computer Science 浏览更多内容
IInfosec
课程
LLearnQuest
课程
LLearnQuest
课程

课程
