Blockchain Security Training

7946

Blockchain Security Training

This course will allow a business or a Blockchain network to have elevated consensus security. The highest-level security breach in a decentralized Blockchain network is the subversion of the node network or consensus mechanism. Any actors with malicious agenda are the threat who needs to accumulate significant financial resources to take over.

At the time, when any IDM in terms of loosely coupled Blockchain channels, it is vital to have fiduciary security. This covers handing over private keys to a 3rd party like a coin exchange is the same as giving your cash or passwords to strangers. This course will allow the users of a Blockchain to safeguard their keys by implementing their Blockchain data security procedures and policy design.

  • Types of security
  • Security practices
  • Blockchain CIA
  • Blockchain IDM and IAM security policies
  • Blockchain security threats and attacks
  • Blockchain incident response techniques
  • Risk analysis

This course is designed for experienced security experts, programmers, developers, and architects who want a comprehensive deep dive in securing your Blockchain environment.

This course is highly technical. To prepare for the class you must:

  • Provide your own computer (Mac/PC/Linux)
  • Have a comprehensive understanding of Hyperledger, Ethereum, or Blockchain Architecture

  • Differentiate the various types of security from a Blockchain of Cryptocurrency perspective
  • Understanding of various basic Blockchain security practices
  • CIA of Blockchain
  • Confidentiality of a Blockchain node
  • Integrity of the information (Private/Public) of a Blockchain node
  • Availability of a nodes data for known nodes to establish consensus/voting in a secured way
  • Role based access control
  • Create a security policy for:
    - Identity Management (Blockchain IDM)
    - Identity and Access Management (IAM)
    - Describe and demonstrate appropriate Blockchain data safeguarding techniques
    - Creating a Blockchain access log for entries and identify potential security issues
    - Differentiate between various security threats and attacks
    - Identify several techniques appropriate to provide basic protection of a private Blockchain
    - Describe incident response techniques
    - Identify potential threats to Blockchain for business (Open/Hyperledger security)
    - Create a risk analysis for a Blockchain

Questions?

Whether you need assistance scheduling a class for yourself or for your group, GCA's Education Account Manager's will craft a customized training solution to meet the needs of your organization.