Before we dive into the details of security, we'll review the various blockchains available as platforms for development, and how they differ.
Managing Your Keys
Attack Vectors and Prevention
For each of the limits of a system, there are a number of ways that a malicious party might exploit them for personal gain. In this module, we'll review the various attacks and provide some suggestions as to how they can be mitigated.
Security is a large and complex topic that cannot be fully addressed in a single online course. What this aims to teach is some prevalent issues common to users and developers of decentralized systems. As there are many technologies involved in the use of blockchains, each with its own area of concern, we cannot address all of them in detail. However, if you want to know what practical steps can be taken to secure yourself or system you work on, this course is for you!
Blockchain (or Distributed Ledger) technology provides a unique system of trust within a network. The ledger tracks the events or data generated within a system and is distributed amongst a network of peers. This ensures that no one can tamper with the information, which enables a range of new possibilities.
If you haven’t already taken the Blockchain 101 course, it is highly recommended once you are acquainted with the concepts introduced there.