ENTD326 - Blockchain and Crypto programming

(APUS-ENTD326.AJ1)
Lessons
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Preface

  • Who this course is for
  • What this course covers
  • To get the most out of this course
2

Blockchain 101

  • The growth of blockchain technology
  • Distributed systems
  • The history of blockchain
  • Introducing blockchain
  • Types of blockchain
  • Summary
3

Decentralization

  • Introducing decentralization
  • Full-ecosystem decentralization
  • Decentralization in practice
  • Innovative trends
  • Summary
4

Symmetric Cryptography

  • Introducing cryptography
  • Cryptographic primitives
  • Random numbers
  • Hash functions
  • Message authentication codes
  • Secret key ciphers
  • Advanced Encryption Standard
  • Summary
5

Asymmetric Cryptography

  • Foundational mathematics
  • Asymmetric cryptography
  • Integer factorization
  • Discrete logarithm
  • Elliptic curves
  • Introducing RSA
  • Introducing ECC
  • Point addition
  • Point doubling
  • Point multiplication
  • Digital signatures
  • Generating RSA digital signatures
  • Generating ECDSA digital signatures
  • Blind signatures
  • Multisignatures
  • Threshold signatures
  • Aggregate signatures
  • Ring signatures
  • Cryptographic constructs and blockchain technology
  • zk-SNARKs
  • zk-STARKs
  • Zero-knowledge range proofs
  • Base64
  • base58
  • Summary
6

Consensus Algorithms

  • Introducing consensus
  • Analysis and design
  • Classification
  • Algorithms
  • Paxos
  • Raft
  • Practical Byzantine Fault Tolerance
  • Istanbul Byzantine Fault Tolerance
  • Tendermint
  • Nakamoto consensus
  • Variants of PoW
  • HotStuff
  • Choosing an algorithm
  • Summary
7

Bitcoin Architecture

  • Introducing Bitcoin
  • Cryptographic keys
  • Addresses
  • Transactions
  • Transaction validation
  • Transaction fees
  • Metadata
  • Inputs
  • Outputs
  • Verification
  • Opcodes
  • Standard transaction scripts
  • Contracts
  • Blockchain
  • Miners
  • CPU
  • GPU
  • FPGAs
  • ASICs
  • Network
  • Wallets
  • Summary
8

Bitcoin in Practice

  • Bitcoin in the real world
  • Bitcoin payments
  • Innovation in Bitcoin
  • Segregated Witness
  • Bitcoin Cash
  • Bitcoin Unlimited
  • Bitcoin Gold
  • Taproot
  • Colored coins
  • Counterparty
  • Bitcoin client installation
  • Setting up the source code
  • Setting up bitcoin.conf
  • Experimenting further with bitcoin-cli
  • Bitcoin programming
  • Summary
9

Smart Contracts

  • Introducing smart contracts
  • Ricardian contracts
  • Smart contract templates
  • Oracles
  • TLSNotary
  • TLS-N-based mechanism
  • Android proof
  • Ledger proof
  • Trusted hardware-assisted proofs
  • Inbound oracles
  • Outbound oracles
  • Cryptoeconomic oracles
  • Deploying smart contracts
  • The DAO
  • Advances in smart contract technology
  • Summary
10

Ethereum Architecture

  • Introducing Ethereum
  • Cryptocurrency
  • Keys and addresses
  • Accounts
  • Transactions and messages
  • Simple transactions
  • Contract creation transactions
  • Message call transactions
  • The world state
  • The account state
  • Transaction receipts
  • Ethereum virtual machine
  • Blocks and blockchain
  • Nodes and miners
  • The Ethereum network
  • Precompiled smart contracts
  • Solidity
  • Runtime bytecode
  • Opcodes
  • Wallets and client software
  • Supporting protocols
  • Summary
11

Ethereum in Practice

  • Ethereum payments
  • Innovations in Ethereum
  • Programming with Geth
  • Geth console
  • Geth attach
  • Geth JSON RPC API
  • Setting up a development environment
  • Starting up the private network
  • Experimenting with the Geth JavaScript console
  • Mining and sending transactions
  • Introducing Remix IDE
  • Interacting with the Ethereum Blockchain with MetaMask
  • Adding a custom network to MetaMask and connecting it with Remix IDE
  • Importing accounts into MetaMask using keystore files
  • Deploying a contract with MetaMask
  • Interacting with a contract through MetaMask using Remix IDE
  • Summary
12

Tools, Languages, and Frameworks for Ethereum Developers

  • Languages
  • The Solidity compiler
  • Tools, libraries, and frameworks
  • ganache-cli
  • Ganache UI
  • Contract development and deployment
  • The Solidity language
  • Local variables
  • Global variables
  • State variables
  • Value types
  • Reference types
  • Summary
13

Web3 Development Using Ethereum

  • Interacting with contracts using Web3 and Geth
  • Interacting with contracts via frontends
  • Deploying and interacting with contracts using Truffle
  • Summary
14

The Merge and Beyond

  • Introduction
  • Ethereum after The Merge
  • Beacon nodes
  • Consensus client
  • Execution client
  • Validator client
  • Proof-of-stake
  • The Merge
  • Sharding
  • The future roadmap of Ethereum
  • Summary
15

Hyperledger

  • Projects under Hyperledger
  • Fabric
  • Sawtooth
  • Iroha
  • Indy
  • Besu
  • Aries
  • Transact
  • Ursa
  • AnonCreds
  • Cello
  • Caliper
  • Grid
  • Hyperledger reference architecture
  • Hyperledger Fabric
  • Membership service
  • Blockchain services
  • Smart contract services
  • APIs and CLIs
  • Peers/nodes
  • Clients
  • Channels
  • World state database
  • Private data collections
  • Transactions
  • Membership Service Provider
  • Smart contracts
  • Crypto service provider
  • Chaincode implementation
  • The application model
  • Fabric 2.0
  • Summary
16

Tokenization

  • Tokenization on a blockchain
  • Types of tokens
  • Process of tokenization
  • Token offerings
  • Token standards
  • Building an ERC-20 token
  • Emerging concepts
  • Summary
17

Enterprise Blockchain

  • Enterprise solutions and blockchain
  • Requirements
  • Compliance
  • Interoperability
  • Integration
  • Ease of use
  • Monitoring
  • Secure off-chain computation
  • Better tools
  • Enterprise blockchain versus public blockchain
  • Enterprise blockchain architecture
  • Designing enterprise blockchain solutions
  • Currently available enterprise blockchains
  • Enterprise blockchain challenges
  • VMware Blockchain
  • Quorum
  • Nodes
  • Privacy manager
  • Enclave encryption
  • Transaction propagation to transaction managers
  • Enclave decryption
  • Setting up a Quorum network with IBFT
  • Other Quorum projects
  • Summary
18

Scalability

  • What is scalability?
  • Layer 0 – multichain solutions
  • Polkadot
  • Layer 1 – on-chain scaling solutions
  • Layer 2 – off-chain solutions
  • Layer 2
  • Data validity
  • Data availability
  • How rollups work
  • Types of rollups
  • Optimistic rollups
  • ZK-rollups
  • Technologies used for building ZK-rollups
  • ZK-ZK-rollups
  • Optimistic rollups vs ZK-rollups
  • Fraud and validity proof-based classification of rollups
  • Example
  • Layer 3 and beyond
  • Summary
19

Blockchain Privacy

  • Privacy
  • Techniques to achieve privacy
  • Tor
  • I2P
  • Indistinguishability obfuscation
  • Homomorphic encryption
  • Secure multiparty computation
  • Trusted hardware-assisted confidentiality
  • Mixing protocols
  • CoinSwap
  • TumbleBit
  • Dandelion
  • Confidential transactions
  • MimbleWimble
  • Zkledger
  • Attribute-based encryption
  • Anonymous signatures
  • Zether
  • Privacy using Layer 2 protocols
  • Privacy managers
  • Cryptographic Commitments
  • Zero-knowledge proofs
  • Building ZK-SNARKs
  • Summary
20

Blockchain Security

  • Security
  • Blockchain layers and attacks
  • Attacks on transactions
  • Transaction replay attacks
  • Attacks on consensus protocols
  • Double-spending
  • Selfish mining
  • Forking and chain reorganization
  • Smart contract vulnerabilities
  • DeFi attacks
  • Oracle attacks/oracle manipulation attacks
  • Attacks on wallets
  • Attacks on layer 2 blockchains 
  • Attacking public key cryptography
  • Attacking hash functions
  • Key management-related vulnerabilities and attacks
  • ZKP-related attacks
  • Security analysis tools and mechanism
  • Formal verification of smart contracts
  • Model checking
  • Oyente
  • Threat modeling
  • Regulation and compliance
  • Summary
21

Decentralized Identity

  • Identity
  • Digital identity
  • Centralized identity model
  • Federated identity model
  • Decentralized identity model
  • Self-sovereign identity
  • Components of SSI
  • Identity in Ethereum
  • Identity in the world of Web3, DeFi, and Metaverse
  • SSI-specific blockchain projects
  • Challenges
  • Summary
22

Decentralized Finance

  • Introduction
  • Financial markets
  • Orders and order properties
  • Order management and routing systems
  • Components of a trade
  • Trade lifecycle
  • Applications of blockchain in finance
  • Decentralized finance
  • Asset tokenization
  • Decentralized exchanges
  • Flash loans
  • Derivatives
  • Money streaming
  • Yield farming
  • Insurance
  • Decentralized lending – lending and borrowing
  • Summary
23

Blockchain Applications and What’s Next

  • Use cases
  • IoT architecture
  • Implementing blockchain-based IoT in practice
  • Government
  • Health
  • Media
  • Blockchain and AI
  • Some emerging trends
  • Some challenges
  • Summary

Related Courses

All Courses
scroll to top