Blockchain Security Training

Blockchain Security Training

2,495.00
Date:
Delivery Option:
Time:
Quantity:
Purchase Now

Course ID: D8003

Duration: 3 Days

Location: Flex - San Francisco or Live Online | Click here to schedule private course.

Overview 

This Blockchain Security Training course is designed to give your business or blockchain network elevated consensus security. The subversion of the node network (or consensus mechanism) is the highest-level security breach in a decentralized blockchain network, and this course will teach your security experts how to protect against such a breach.

Students will learn how to safeguard their private keys through implementing data security procedures and through strict policy design. Specific course objectives will include:

  • Types of security

  • Security practices

  • Blockchain CIA

  • Blockchain IDM and IAM security policies

  • Security, threats, and attacks

  • Incident response techniques

  • Risk analysis 

+ Who Should Attend

As an advanced course, Blockchain Security Training is intended for highly experienced technical professionals. Students must provide their own computer, and have a comprehensive understanding of at least one of Blockchain, Ethereum, or Hyperledger architecture.

Typical students include:

  • Security experts
  • Programmers
  • Developers
  • Architects

+ Course Outline

Module 1: Differentiate the various types of security from a Blockchain of Cryptocurrency’ perspective

Module 2: Understanding of various basic Blockchain security practices

Module 3: CIA of Blockchain

Module 4: Confidentiality of a Blockchain node

Module 5: Integrity of the information (Private/Public) of a Blockchain node

Module 6: Availability of a node’s data for known nodes to establish consensus/voting in a secured way

Module 7: Role based access control

Module 8: Create a security policy for:

  • Identity Management (Blockchain IDM)
  • Identity and Access Management (IAM)
  • Describe and demonstrate appropriate Blockchain data safeguarding techniques
  • Creating a Blockchain access log for entries and identify potential security issues
  • Differentiate between various security threats and attacks
  • Identify several techniques appropriate to provide basic protection of a private Blockchain
  • Describe incident response techniques
  • Identify potential threats to Blockchain for business (Open/Hyperledger security)
  • Create a risk analysis for a Blockchain

+ Prerequisites

A comprehensive understanding of at least one of Blockchain, Ethereum, or Hyperledger architecture.

+ Certifications

N/A