Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Blockchain and Smart Contracts Security (EN)
01 - Introduction
02 - What you should know (0:41)
01 - Security concerns with blockchain (2:30)
02 - 1. Demystifying Blockchain
02 - Smart contracts and dApps (2:36)
01 - What is blockchain (5:53)
03 - How blockchain works (8:22)
03 - 2. Security Properties of Blockchain
02 - Immutability (2:23)
01 - Consensus (5:46)
03 - Cryptography Keys and addresses (3:04)
04 - Cryptography Validation (4:08)
04 - 3. Security Model for the Blockchain Ecosystem
01 - Overall technology architecture (3:39)
02 - Attack surface and vectors (1:48)
03 - Security model (1:38)
05 - 4. Blockchain Platform Security
01 - Proof-of-work protocol attacks (7:40)
02 - Proof-of-stake protocol attacks (3:37)
06 - 5. Distributed Apps and Smart Contracts Security
01 - Smart contracts and EVM (4:14)
02 - Anatomy of a smart contract (3:03)
03 - Deploying a smart contract (2:20)
04 - Smart contracts threats Part one (5:18)
05 - Smart contracts threats Part two (4:52)
06 - Secure design (4:22)
07 - 6. Non-distributed Apps and Enabler Services
01 - Blockchain ecosystem threats Part one (4:28)
02 - Blockchain ecosystem threats Part two (3:21)
03 - Blockchain ecosystem threats Part three (2:24)
08 - 7. End User Security
01 - Wallet and keys security (2:02)
02 - Web session security (1:59)
09 - Conclusion
01 - Next steps (0:47)
Teach online with
03 - Cryptography Keys and addresses
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock