Skill Up Card - Course Bundles

Pricing is per delegate, giving you huge savings over the cost of individual courses.

  • UK = £2,000 + VAT per Skill Up Card
  • Ireland = €2,400 per Skill Up Card
skill up card logo - Nexus Human

Blockchain Security Training

4.6 out of 5 rating Last updated 21/11/2024   English

Jump to outline

Click "Enquire" below to find out more about this course

Interested in available dates? Would like to book a private session of this course for your company? Or for any other queries please simply fill out the form below.


Duration

3 Days

18 CPD hours

Overview

Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain's inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques.

Description

This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more.

Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions
  • Public Key Cryptography
  • Elliptic Curve Cryptography
  • A Brief Introduction to Blockchain The Blocks
  • The Chains
  • The Network
  • Promises of the Blockchain
  • Blockchain Security Assumptions Digital Signature Security
  • Hash Function Security
  • Limitations of Basic Blockchain Security Public Key Cryptography Review
  • Real-Life Public Key Protection
  • Cryptography and Quantum Computers
  • Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function
  • Hash function with poor non-locality
  • Hash function with small search space
  • Breaking Public Key Cryptography Brute Forcing a Short Private Key
  • Brute Forcing a Poorly-Chosen Private Key
Consensus in the Blockchain
  • Blockchain Consensus and Byzantine Generals Blockchain Networking Review
  • Byzantine Generals Problem Relation to Blockchain
  • Byzantine Fault Tolerance
  • Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough
  • Proof of Work What is Proof of Work
  • How does Proof of Work Solve BGP
  • Proof of Work Security Assumptions
  • Attacking Proof of Work
  • Proof of Stake What is Proof of Stake
  • How does Proof of Stake Solve BGP
  • Proof of Stake Security Assumptions
  • Attacking Proof of Stake
  • General Attacks on Blockchain Consensus
  • Other Blockchain Consensus Algorithms
  • Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack
  • Performing a Selfish Mining Attack
  • Attacking Proof of Stake Performing a XX% Attack
  • Performing a Long-Range Attack
  • Malleable Transaction Attacks
Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains
  • Checkpointing
  • Advanced Cryptographic Solutions Multiparty Signatures
  • Zero-Knowledge Proofs
  • Stealth Addresses
  • Ring Signatures
  • Confidential Transactions
  • Lab 3 (Tentative) Permissioned Blockchains
  • 51% on a Checkpointed Blockchain
  • Data mining on a blockchain with/without stealth addresses
  • Zero-Knowledge Proof Simulation
  • Trying to fake knowledge of a ZKP
  • Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum
  • Consensus in Ethereum
  • Smart Contracts in Ethereum
  • Ethereum Security
  • Pros and Cons of Ethereum Blockchains
  • Introduction to Hyperledger Security What is Hyperledger
  • Consensus in Hyperledger
  • Smart Contracts in Hyperledger
  • Hyperledger Security
  • Pros and Cons of Hyperledger Blockchains
  • Introduction to Corda Security What is Corda
  • Consensus in Corda
  • Smart Contracts in Corda
  • Corda Security
  • Pros and Cons of Corda Blockchains
  • Lab 4
Blockchain Risk Assessment What are the Risks of the Blockchain
  • Information Security
  • Information Sensitivity Data being placed on blockchain
  • Risks of disclosure
  • Regulatory Requirements Data encryption
  • Data control
  • PII protection
  • Blockchain Architectural Design Public and Private Blockchains
  • Open and Permissioned Blockchains
  • Choosing a Blockchain Architecture
  • Lab 5
  • Exploring public/private open/permissioned blockchains
Basic Blockchain Security Blockchain Architecture
  • User Security Protecting Private Keys
  • Malware
  • Update
  • Node Security
  • Configuring MSPs
  • Network Security
  • Lab 6 (TBD)
Smart Contract Security Introduction to Smart Contracts
  • Smart Contract Security Considerations Turing-Complete
  • Lifetime
  • External Software
  • Smart Contract Code Auditing Difficulties
  • Techniques
  • Tools
  • Lab 7 (Tentative)
  • Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities
  • Module 8: Security Implementing Business Blockchains Ethereum Best Practices
  • Hyperledger Best Practices
  • Corda Best Practices
  • Lab 8
Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks
  • 51% Attacks
  • Denial of Service Attacks
  • Eclipse Attacks
  • Routing Attacks
  • Sybil Attacks
  • Lab 9
  • Perform different network-level attacks
System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities
  • The Bitcoin Hack
  • The Verge Hack
  • The EOS Vulnerability
  • Lab 10
Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities
  • Reentrancy
  • Access Control
  • Arithmetic
  • Unchecked Return Values
  • Denial of Service
  • Bad Randomness
  • Race Conditions
  • Timestamp Dependence
  • Short Addresses
  • Lab 11
  • Exploiting vulnerable smart contracts
Security of Alternative DLT Architectures What Are Alternative DLT Architectures
  • Introduction to Directed Acyclic Graphs (DAGs)
  • DAGs vs. Blockchains
  • Advantages of DAGs
  • DAG Vulnerabilities and Security
  • Lab 12
  • Exploring a DAG network
Additional course details:

Nexus Humans Blockchain Security Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward.

This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts.

Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success.

While we feel this is the best course for the Blockchain Security Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you.

Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

FAQ for the Blockchain Security Training Course

Available Delivery Options for the Blockchain Security Training training.
  • Live Instructor Led Classroom Online (Live Online)
  • Traditional Instructor Led Classroom (TILT/ILT)
  • Delivery at your offices in London or anywhere in the UK
  • Private dedicated course as works for your staff.
How many CPD hours does the Blockchain Security Training training provide?

The 3 day. Blockchain Security Training training course give you up to 18 CPD hours/structured learning hours. If you need a letter or certificate in a particular format for your association, organisation or professional body please just ask.

What is the correct audience for the Blockchain Security Training training?

Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience

Do you provide training for the Blockchain Security Training.

Yes we provide corporate training, dedicated training and closed classes for the Blockchain Security Training. This can take place anywhere in UK including, England, Scotland, Cymru (Wales) or Northern Ireland or live online allowing you to have your teams from across UK or further afield to attend a single training event saving travel and delivery expenses.

What is the duration of the Blockchain Security Training program.

The Blockchain Security Training training takes place over 3 day(s), with each day lasting approximately 8 hours including small and lunch breaks to ensure that the delegates get the most out of the day.

Why are Nexus Human the best provider for the Blockchain Security Training?
Nexus Human are recognised as one of the best training companies as they and their trainers have won and hold many awards and titles including having previously won the Small Firms Best Trainer award, national training partner of the year for UK on multiple occasions, having trainers in the global top 30 instructor awards in 2012, 2019 and 2021. Nexus Human has also been nominated for the Tech Excellence awards multiple times. Learning Performance institute (LPI) external training provider sponsor 2024.
Is there a discount code for the Blockchain Security Training training.

Yes, the discount code PENPAL5 is currently available for the Blockchain Security Training training. Other discount codes may also be available but only one discount code or special offer can be used for each booking. This discount code is available for companies and individuals.

Jump to dates

Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us


Top

}