Blockchain Security Training

Blockchain Security Training

Print Friendly, PDF & Email

Introduction:

Blockchain Security Training Course with Hands-on Exercises (Online, Onsite and Classroom Live)

This Blockchain Security Training course covers all known aspects of Blockchain security existing in the Blockchain environment today. You’ll gain a detailed overview of Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, and advanced Blockchain security practices.

In-depth Blockchain Security Training labs will provide you with practical, real world tools for not only recognizing security threats, but mitigation and prevention. This includes best practices, known attack vectors, threat identification, response techniques, and much more.

Duration: 3 days

Related Courses

Customize It:

  • If you are familiar with some aspects of Blockchain Security Training, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Blockchain Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Blockchain Security Training course in manner understandable to lay audiences.

Blockchain Security Training – Audience / Target Group:

The target audience for this Blockchain Security Training course is defined here:

  • Architects, Developers, System and Network Administrators who are responsible for implementing, identifying, and managing security a Blockchain network.

Blockchain Security Training – Prerequisites:

This Blockchain Security Training course is highly technical. To prepare for the class you should:

Blockchain Security Training – Objectives:

Identifying and differentiating between security threats and attacks on a Blockchain network

  • Blockchain security methods, best practices, risk mitigation, and more
  • All known (to date) cyber-attack vectors on the Blockchain
  • How to perform a Blockchain network security risk analysis
  • A complete understanding of Blockchain’s inherent security features and risks
  • An excellent knowledge of best security practices for Blockchain System/Network Administrators
  • Appropriate Blockchain data safeguarding techniques

Blockchain Security Training – Course Syllabus:

Fundamental Blockchain Security

  • Cryptography for the Blockchain
  • A Brief Introduction to Blockchain
  • Blockchain Security Assumptions
  • Limitations of Basic Blockchain Security

Consensus in the Blockchain

  • Blockchain Consensus and Byzantine Generals
  • Introduction to Blockchain Consensus Security
    • Proof of Work
    • Proof of Stake
    • Other Blockchain Consensus Algorithms

Advanced Blockchain Security Mechanisms

  • Architectural Security Measures
    • Permissioned Blockchains
    • Checkpointing
  • Advanced Cryptographic Solutions
    • Multiparty Signatures
    • Zero-Knowledge Proofs
    • Stealth Addresses
    • Ring Signatures
    • Confidential Transactions

Smart Contract Security

  • Introduction to Smart Contracts
  • Smart Contract Security Considerations
  • Smart Contract Code Auditing

Blockchain Risk Assessment

  • Blockchain Risk Considerations
  • Regulatory Requirements
  • Blockchain Architectural Design

Basic Blockchain Security

  • User Security
  • Node Security
  • Network Security

Blockchain for Business

  • Introduction to Ethereum Security
  • Introduction to Hyperledger Security
  • Introduction to Corda Security

Securely Implementing Business Blockchains

  • Business Operations
  • Data Management
  • Infrastructure
  • Legal and Regulatory Compliance

Network-Level Vulnerabilities and Attacks

  • 51% Attacks
  • Denial of Service Attacks
  • Eclipse Attacks
  • Replay Attacks
  • Routing Attacks
  • Sybil Attacks

System-Level Vulnerabilities and Attacks

  • The Bitcoin Hack
  • The Verge Hack
  • The EOS Vulnerability
  • The Lisk Vulnerability

Smart Contract Vulnerabilities and Attacks

  • Reentrancy
  • Access Control
  • Arithmetic
  • Unchecked Return Values
  • Denial of Service
  • Bad Randomness
  • Race Conditions
  • Timestamp Dependence
  • Short Addresses

Security of Alternative DLT Architectures

  • Introduction to DAG-Based DLTs
  • Advantages of DAG-Based DLTs
  • Limitations of DAG-Based DLTs

Instructor:

Michael McCarthy is an Instructor at Harvard Extension School teaching Blockchain Innovation as well as a Blockchain consultant. Michael’s blockchain clients span the globe from the U.S. to China. He has used Blockchain for clients to enhance supply chain movement of goods from Pakistan to Europe. Michael has helped Chinese clients create an ICO (Initial Coin Offering) to pay US Instructors teaching Chinese students online through an education portal while staying compliant with Chinese asset transfer laws.

Currently, Michael is creating a biometric ID system with MIT to help refugees leave refugee camps faster by bringing their verified credentials to the blockchain. As a serial entrepreneur with 6 companies in his portfolio Michael enjoys variety and crossing technology solutions across industries to add value quickly and efficiently.

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame:

    0