Blockchain and Crypto Security Training

Blockchain and Crypto Security Training

I’ve been providing blockchain security and crypto compliance training awareness sessions since 2013.

I’m sharing my latest blockchain security training material under the Creative Commons Attribution-NonCommercial 4.0 International License.

This is a comprehensive introduction to blockchain technology and its implementations, together with related cyber risks and vulnerabilities. The material presents a number of countermeasures and best practices to deter threats to blockchain solutions.The full Table of Contents is below.

Download the PDF

Blockchain and Crypto Security Training

Free download – PDF [22 MB] – No registration required

Copyright © Marin Ivezic 2022

Creative Commons Licence
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Table of Contents

1. Introduction to Blockchain

2. Blockchain Cryptography

    1. Hash Functions
    2. Public Key Cryptography
    3. Advanced Cryptographic Applications

3. Blockchain Consensus Security

    1. Introduction to Consensus
    2. Securing Proof of Work (The 51% Attack, Denial of Service Attacks, Selfish Mining, SPV Mining)
    3. Securing Proof of Stake (XX% Attack, The Proof of Stake “Timebomb”, Long-Range Attacks, The Nothing at Stake Problem, Resource Exhaustion Attacks)

4. Blockchain User, Node, and Network Security

    1. User Security (Non-Random Private Keys, Exposed Mnemonic Seeds, Nonexistent/Insecure Backups, Third-Party Key Management, Phishing Attacks, Compromised Hardware Wallets  Unverified Transactions, DeFi Spend Approvals)
    2. Node Security (Blockchain Breakouts, Denial of Service Attacks, Malware, Man-in-the-Middle Attacks, Software Misconfigurations)
    3.  Network Security (Denial of Service Attacks, Eclipse/Routing Attacks, Sybil Attacks)

5. Smart Contract Security

    1. Introduction to Smart Contract Security
    2. General Programming Vulnerabilities (Arithmetic Vulnerabilities, Decimal Precision, Digital Signature Vulnerabilities, External Dependencies, Text Direction, Unsafe Serialization)
    3. Blockchain-Specific Vulnerabilities (Access Control, Denial of Service, Frontrunning, Rollback Attacks, Timestamp Dependence, Weak Randomness)
    4. Platform-Specific Vulnerabilities (Denial of Service: Block Gas Limits, Denial of Service: Unexpected Revert, Forced Send of Ether, Missing Zero Address Checks, Reentrancy, Short Addresses, Token Standards Compatibility, Unchecked Return Values, Unsafe External Calls)
    5. Decentralized Finance (DeFi) Vulnerabilities (Access Control, Centralized Control and Governance, Cross-Chain Bridge Vulnerabilities, Frontend Vulnerabilities, Price Manipulation)
    6. Non-Fungible Token (NFT) Vulnerabilities (Forged NFTs, Off-Chain Assets, Malicious NFTs, Unlimited Token Supplies)
    7. Securing Smart Contracts (Secure Smart Contract Development Resources, Smart Contract Security Audit Tools)

6. Developing Secure Blockchain Systems

    1. Blockchain Architecture
    2. Balancing Blockchain Benefits and Risks
    3. Regulatory Considerations for Blockchain Systems