Cybersecurity for Blockchain from Ground Up
Cybersecurity for Blockchain from Ground Up
Intermediate
6 Hrs
Implement, identify, and manage security in your Blockchain applications
Implement, identify, and manage security in your Blockchain applications
Overview
Blockchains are being widely adopted across many industries but with the adoption of a new technology, you may face new security challenges.
Vulnerabilities in blockchain applications can lead to millions in losses if the proper cybersecurity practices and mechanisms are not implemented. Now, more than ever, it is important to build secure applications.
In this course, you will understand what the security vulnerabilities of blockchain are and we are will guide you through the best cybersecurity practices for blockchain applications. You will learn the security patterns that will ensure confidentiality, integrity and availability for any blockchain application. You will also get a good understanding of how to architect a blockchain application securely on the cloud.
This course introduces the blockchain cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. Moving on, you will learn the workings of Blockchain technology, Ethereum, and Hyperledger architecture and how they fit into the cybersecurity ecosystem. We will also learn about data encryption, PKI infrastructure and digital signatures, secure internet protocols, how to create a secure production environment, the ability to make tradeoff decisions regarding blockchain scalability, costs, decentralization, and security.
Once you complete this course, you will feel better prepared to implement secure applications using blockchain
What You Will Learn
- Solid understanding about Cryptography, hashing, public key infrastructure, RSA and ECDSA
- You will learn what is blockchain and what are the main blockchain technologies in the market
- Understanding the differences between public and private blockchains from the security standpoint
- Learn how to decide which blockchain to choose according to your business case and according to the CIA
- Understanding blockchainโs CIA - Confidentiality, Integrity and Availability
- Understanding blockchainโs AAA - Authentication Authorization and Accounting
Prerequisites
- Basic IT and blockchain knowledge
- A computer with an internet connection
Content
Chapter 1: Introduction to Blockchain
11 Videos
What is Blockchain? Why is Blockchain Important? Why is Blockchain Important? โ The Use Cases What is a Blockchain? Centralized, Decentralized, and Distributed Why do we need Blockchain? What makes a good Blockchain Use Case? Blockchain Decision Tree What is Consensus Mechanism? Smart Contracts $7 Million Cybersecurity Scholarship by EC-Council Chapter 1 Quiz
Preview
Chapter 2: Cybersecurity for Blockchain
14 Videos
Cybersecurity for Blockchain: Introduction The CIA Triad The AAA of Security Non-repudiation How to Measure Risk? How to Measure Risk? โ II Blockchain Governance Blockchain Governance โ II Types of Blockchains The Blockchain Trilemma Quantum Computing Differences between types of Blockchains Smart Contracts Oracles Chapter 2 Quiz
Preview
Chapter 3: Cryptography, Hashing, and Digital Signatures
10 Videos
Cryptography, Hashing, and Digital Signatures: Introduction Consensus Mechanisms Hashing Hash Function Characteristics Digital Signatures Multi-signature Random Numbers Prime Numbers RSA ECDSA Chapter 3 Quiz
Preview
Chapter 4: IAM for Blockchain
8 Videos
IAM for Blockchain MFA Authorization and Permission Permissioned and Permissionless Node Permissions and ALC Least Privilege and Segregation of Duties Password Security User Authentication Chapter 4 Quiz
Preview
Chapter 5: Logging and Monitoring
2 Videos
Logging and Monitoring Monitoring Chapter 5 Quiz
Preview
Chapter 6: Infrastructure Security
6 Videos
Data Encryption Denial of Service Man-in-The-Middle Attack System Resiliency Infrastructure Hardening Blockchain Node Infrastructure Chapter 6 Quiz
Preview
Chapter 7: Applications Architecture
5 Videos
Applications Architecture VPCs NACLs Testing your Blockchain Application Other Security Practices Chapter 7 Quiz
Preview
Chapter 8: Incident Detection and Response
2 Videos
Video 1 โ Incident Detection and Response Contingency Planning Chapter 8 Quiz
Preview
Chapter 9: Conclusion
1 Videos
Conclusion
Preview
Instructor
Henrique Centieiro
Get access to only this course
$69.99
One-time PaymentGet access to all 500+ courses with EC-Council Pro
$59.99/Month
Get access to all 500+ courses with EC-Council Pro
$599/Year
Get 2 months free!
Looking to train your team?
Try EC-Council Enterprise ยปReviews
(338 reviews)
5
Average Course Rating
Related Courses
469 enrollments
Course
CCNA - Understanding Routers and Switches
$49.99
231 enrollments
Course
CISSP Certification Domains 5, 6, 7, and 8 Video Training
$69.99
809 enrollments
Course
Learn Ethical Hacking by Hacking Real Websites Legally
$69.99