Blockchain Security

Blockchain is a distributed database that provides a secure, yet transparent way to make, record and verify any type of transaction. It eliminates the need for centralized control – instead, all transactions are decentralized and verified by the blockchain database itself in the distributed ledger.

Please find the objective of the training below:

  • Introduction to Cryptography
  • Blockchain Attacks
  • Blockchain Vulnerabilities

5 Days

Basic Coding Skills

  • Money, Legal Tender and Bitcoin
  • Bitcoin and Silk Road
  • Blockchain
  • Address
  • Timestamp
  • Ledger and Distributed Ledger
  • Proof of Work PoW Proof of Stake PoS Practical Byzantine Fault Tolerance PBFT
  • Bitcoin Blockchain series of attack
  • Cryptography A Story of Corporate Lover
  • Symmetric and asymmetric cryptography
  • Hash Function
  • Hash Function Demo
  • Hash Function Properties
  • PoW Email Example
  • Digital Signature
  • Genesis Block Merkle tree
  • Mining
  • Blockchain Security Topics Overview
  • Access Control
  • Blockchain Node Interaction
  • Hardening of Server SSH
  • Firewall & Server Security
  • Network-Security
  • Permission Management
  • Regulating-Blockchain-Parameters
  • Target Time Interval TTI
  • Mining Difficulty
  • Mining Diversity
  • Parameters of Blockchain
  • Secure Backup: Keys
  • Consensus Mechanism
  • Contingency Plan Policy Testing and Backup
  • IRP Incident Response Plan
  • Blockchain: Attacks
  • Blockchain: Attacks Types


  • Smart-Contract-Security
  • Smart Contract: Introduction & Features
  • Security Vulnerabilities: Blockchain
  • Security Vulnerabilities: Immutable Bugs Ether Lost in Transfer
  • Security Vulnerabilities: Stack Size Limit
  • Security Vulnerabilities: Call to Unknown
  • Security Vulnerabilities: Type Caste
  • Smart Contract Errors & Vulnerability Demo

ICO: Security

ICO: Introduction and Brief History