Tags
Language
Tags
November 2024
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30

Solidity For Qa, Devsecops And Tpms

Posted By: ELK1nG
Solidity For Qa, Devsecops And Tpms

Solidity For Qa, Devsecops And Tpms
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.48 GB | Duration: 10h 52m

QA, DevSecOps, and TPM, Best Practices for Developing Hack-Resistant Ethereum Applications

What you'll learn

Identify common security vulnerabilities in Solidity smart contracts like reentrancy, integer overflows, and access control issues.

Learn about secure coding standards like checks-effects-interactions to prevent reentrancy and race conditions.

Follow best practices like code simplicity, modularization, and threat modeling when architecting smart contracts.

Analyze past hacks and exploits to improve understanding of real-world Solidity security failures.

Learn about DevOps and SecDevOps to minimize security and functional issues in code

Requirements

Success in a Solidity security course, which focuses on an awareness of what needs to be completed to secure smart contracts and decentralized applications (DApps) built on blockchain platforms like Ethereum. This skill set requires a combination of technical skills, foundational knowledge, and the right mindset for change and problem solving.

Description

Course DescriptionThis "QA and SecDevOps Best Practices for Developing Hack-Resistant Ethereum Applications" course is designed to equip students with the skills and knowledge to develop secure and robust smart contracts and decentralized applications (DApps) on blockchain platforms like Ethereum. In today's rapidly evolving blockchain landscape, security is paramount, and this course focuses on teaching students how to identify, prevent, and mitigate common vulnerabilities and threats that can jeopardize the integrity and value of blockchain-based systems.This course is focused on QA, DevSecOps, and Technical Project Managers and their roles and knowledge for developing smart contracts on an Ethereum style blockchain. Course Highlights:Solidity Fundamentals: Students will start with a strong foundation in Solidity, the programming language used for Ethereum smart contracts. They will learn how to write and deploy basic contract agreements, understand the Ethereum Virtual Machine (EVM), and explore the intricacies of blockchain development.Security Best Practices: The course will explore security best practices for smart contract development. Topics include access control, input validation, secure data storage, and protection against reentrancy attacks. Students will also examine real-world case studies of smart contract vulnerabilities and breaches.By the end of the "QA and SecDevOps Best Practices for Developing Hack-Resistant Ethereum Applications" course, students will have a deep understanding of Solidity programming, blockchain security principles, and the ability to develop smart contracts and DApps that adhere to industry best practices. Whether students are aspiring blockchain developers, auditors, or security professionals, this course provides the knowledge and skills necessary to securely navigate blockchain technology's exciting and ever-evolving world.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Navigating the uDemy video

Lecture 3 Book for this course

Section 2: Security Requirements Engineering

Lecture 4 Security Modeling

Lecture 5 What is Security Requirements Engineering

Lecture 6 Abuse Case Modeling

Lecture 7 Secure Case Modeling

Lecture 8 SQUARE

Lecture 9 OCTAVE

Lecture 10 Downloadable Document Templates

Section 3: Secure Design Principles

Lecture 11 Threat Modeling

Lecture 12 Secure Application Architecture

Lecture 13 Proxy Contracts

Section 4: Secure Coding Practices

Lecture 14 Input Validation

Lecture 15 Input Validation Examples

Lecture 16 Authorization and Authentication

Lecture 17 Contract Proxy

Lecture 18 Example Setting up RBAC in a Smart Contract

Lecture 19 Cryptography

Lecture 20 Session Management

Lecture 21 Error Handling

Lecture 22 The Defensive Programming Mindset

Lecture 23 Proof of Work - Consensus Protocols

Lecture 24 Proof of Stake - Consensus Protocols

Lecture 25 Other types of Consensus Protocols

Section 5: Static and Dynamic Application Security Testing (SAST & DAST)

Lecture 26 SAST and DAST

Lecture 27 Static Application Testing

Lecture 28 Manual Code Review

Lecture 29 Dynamic Application Testing

Lecture 30 Automated Security Testing

Lecture 31 Proxy Based Security Testing Tools

Lecture 32 Pre-Deployment Checks

Lecture 33 Using a Test Environment

Lecture 34 Post-Deployment Checks

Section 6: Security Levels

Lecture 35 Security Levels - Network

Lecture 36 Security Levels - Host

Lecture 37 Security Levels - Web

Lecture 38 Security Levels - Database

Lecture 39 Security Levels - Monitoring and Maintenance

Lecture 40 Security Levels - Audit

Lecture 41 Security Levels - Oracles and 3rd party systems

Lecture 42 How to monitor your contract

Lecture 43 Cost Management

Lecture 44 Wallet Security

Lecture 45 Vault Security

Lecture 46 Vault or Wallet

Lecture 47 Mnemonic Keys

Lecture 48 Mnemonic Reconstruction

Lecture 49 BIP-39 Overview

Lecture 50 Off-Chain Workers

Section 7: Secure Programming for QA, DevSecOps and TPMs

Lecture 51 ERCs

Lecture 52 Blockchain Security Vendors

Lecture 53 Past Attacks

Lecture 54 What is Open Zeppelin

Lecture 55 Open Zeppelin Templates

Lecture 56 Using Open Zeppelin Libraries

Lecture 57 Breaking Changes

Section 8: Common Attacks - Things to know and test for

Lecture 58 Using live examples from the internet for test ideas

Lecture 59 Bypass Contract Checks

Lecture 60 Rentracy Example

Lecture 61 Check Effects

Lecture 62 Collisions

Lecture 63 Contract Size Check

Lecture 64 Delegate Call

Lecture 65 Denial of Service

Lecture 66 External Calls

Lecture 67 Malicious Code

Lecture 68 Front Running

Lecture 69 Testing Governance Controls

Lecture 70 Testing Governance Wallets

Lecture 71 Finding Hidden Malicious Code

Lecture 72 On Chain Data

Lecture 73 Oracle Manipulation

Lecture 74 Overflow/Underflow

Lecture 75 Private Data via API

Lecture 76 Public Data via API

Lecture 77 Randomness

Lecture 78 Self Destruct

Lecture 79 Signature Replay

Lecture 80 Time

Lecture 81 DevOps

Lecture 82 DevSecOps

Lecture 83 QA process

Section 9: Finish

Lecture 84 Thank you for taking this course

Everyone, but a background in CEH, SecDevOps, or QA would be beneficial