Why join the course?
In this course, we will look at how the structure of blockchain and the peer-to-peer network topology of blockchain is vulnerable. We will also study how application-oriented attacks arise. We will introduce the concepts of selfish mining and majority attacks, along with time-jacking and consensus delay attacks. We will also look at the peripheral factors that contribute to blockchain vulnerabilities, including wallet theft, cryptojacking and attacks on smart contracts.
What topics will you cover?
- Blockchain Structure Attacks
- Blockchains Peer-To-Peer System
- Application Oriented Attacks
What will you achieve?
By the end of the course, you‘ll be able to...
- Define Blockchain forks
- Discuss the vulnerabilities of stale and orphaned blocks
- Explain the network impacts of Selfish Mining
- Discuss the implications of Distributed Denial of Service (DDOS) Attacks
- Devise a plan to address block withholding attacks
- Discuss the implications of time-jacking attacks
- Discuss the issues raised by Blockchain ingestion and anonymity
- Explain how attacks on smart contracts can be countered
Who is the course for?
The course is aimed at IT professionals in employment in Republic of Ireland registered companies. To qualify for direct entry they must have a Level 8 Honours Degree (2.2) or higher in Computer Science, Computing, Computer Applications or a related discipline. Applicants without these entry requirements (e.g., Level 7 degree or lower than an Honours 2.2 in a Level 8 degree) may be considered if they can demonstrate previously obtained competence equivalent to the entry requirements.