Blockchain security

Blockchain security
Introduction to blockchain consensus Blockchain systems are a collection of decentralized nodes that maintain a shared digital ledger. Without a centralized

October 07, 2020
Howard Poston
Blockchain security
Introduction to blockchain nodes HTTP and other web standards define how computers are supposed to communicate with one another, not the software that is us

October 07, 2020
Howard Poston
Blockchain security
How public-key cryptography works Public-key or asymmetric cryptography is one of the two main types of encryption algorithms. Its names come from the fact t

September 29, 2020
Howard Poston
Blockchain security
Hash functions are one of the most extensively-used cryptographic algorithms in blockchain technology. They are cryptographic (but not encryption) algorithms

September 29, 2020
Howard Poston
Blockchain security
Introduction The blockchain gets its name from its underlying structure. The blockchain is organized as a series of “blocks” that are “chained” together. Und

September 29, 2020
Howard Poston
Blockchain security
Beyond the basic blockchain The core blockchain protocol implements a distributed ledger capable of performing cryptocurrency transfers. Smart contract platf

September 21, 2020
Howard Poston
Blockchain security
Blockchain attack vectors Blockchain can be attacked in a number of different ways. Many of the most famous attacks focus on issues with either the theoretic

September 14, 2020
Howard Poston
Blockchain security
The need for consensus in blockchain Blockchain technology is designed to create a distributed, decentralized and immutable digital ledger. Each node in the

August 31, 2020
Howard Poston
Blockchain security
Introduction The goal of blockchain is to create a fully decentralized, trustless digital ledger. This is an ambitious goal since most ledger systems in use

June 25, 2020
Howard Poston
Blockchain security
Introduction Despite being over a decade old, blockchain has only really taken off within the last few years. During this time, it has moved from a fad to th

June 25, 2020
Howard PostonLearn Blockchain Security
Build your blockchain security skills with five courses covering security at each level of the blockchain ecosystem. What you'll learn:- Blockchain structure
- Cryptographic algorithms
- Blockchain attacks
- Smart contract security
- And more
In this series
- Rise of cryptocurrency attacks: Inside dark web investigations
- Decentralized identifiers (DIDs) and blockchain: The silver bullet for online privacy?
- Cryptocurrency Enforcement Framework: Impacts on digital forensic investigations
- Blockchain and hash functions
- What are smart contracts?
- Introduction to blockchain consensus algorithms
- Advanced cryptography in blockchain
- Blockchain alternative distributed ledger architectures
- Ethereum vulnerabilities and smart contracts
- Attacking the blockchain network
- Proof of work in consensus algorithms
- Targeting the blockchain node
- Public-key cryptography in blockchain
- Hash functions in blockchain
- Blockchain structure
- Blockchain: Beyond the basics
- Blockchain security: Can blockchain be hacked?
- Consensus algorithm security
- Fundamentals of blockchain security
- Blockchain security overview
- Taking an Identity Selfie – Self-Sovereign Identity and the Blockchain
- Blockchain Vulnerabilities: Imperfections of the Perfect System
- Security vulnerabilities of cryptocurrency exchanges
- The End of Bitcoin Ransomware?
- Bitcoin May Turn from Cybercriminals’ Biggest Asset into Their Biggest Liability
- What is Bitcoin?
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!