Security is Changing
Blockchain security has evolved far beyond smart contract bugs and basic consensus risks. Today’s defenders must secure multi-layer ecosystems, cross-chain bridges, off-chain infrastructure, and an entirely new frontier of AI-driven autonomous agents. This course is a comprehensive, forward-looking blockchain security program, designed for professionals who need to understand not only how attacks work but also why ecosystems break and how to design systems that survive real adversaries.
In-depth Content
Access more than 170 lectures, and you will learn how to dissect attacks, model threat surfaces, secure decentralized systems, and defend against emerging risks created by AI, multi-agent systems, nation-state adversaries, MEV optimization engines, and cross-domain execution pathways.
Intermediate Level Course
The internet is awash in beginner-level courses. This is meant to be an intermediate-level course that builds on basic blockchain security. If you have taken our basic blockchain security course or others, this course builds on that content to help you understand and work with modern blockchain attacks and AI as a hyperspeed attack vector.
About the course
This intermediate-level Blockchain Security course goes far beyond basic smart contract bugs to examine how modern Web3 systems actually fail in practice. You will learn to threat model the full blockchain stack, including wallets, dApps, consensus layers, Layer 2 systems, bridges, and off-chain infrastructure, using proven frameworks such as STRIDE, PASTA, OCTAVE, and trust boundary analysis. The course covers real-world attack classes including consensus manipulation, MEV and mempool abuse, economic exploits in DeFi, cross-chain and bridge failures, hybrid Web2/Web3 infrastructure risks, and AI-enhanced attack surfaces. You will also explore secure development and defensive engineering practices, DevSecOps for blockchain, audit workflows, runtime monitoring, and governance controls, alongside forward-looking topics such as AI agents, autonomous exploit pipelines, regulatory pressures, quantum-era cryptography, and national security considerations. Designed for blockchain engineers, security professionals, auditors, and risk practitioners who already understand the basics, this course builds the skills needed to analyze, defend, and design resilient blockchain systems in an increasingly adversarial and AI-accelerated environment.
Curriculum
-
1
Threat Modeling for the Blockchain
- Threat Modeling the Web 3 Stack Part 1 Free preview
- Threat Modeling the Web 3 Stack Part 2 Free preview
- Comparing different threat models Free preview
-
(Included in full purchase)
The Octave Threat Model
-
(Included in full purchase)
The Square Threat Model
-
(Included in full purchase)
The Stride Threat Model
-
(Included in full purchase)
The PASTA Threat Model
-
(Included in full purchase)
Linddun and Atlas Threat Modeling
-
(Included in full purchase)
NIST Blockchain Models
-
(Included in full purchase)
Example: Using STRIDE to threat model an EVM
-
(Included in full purchase)
Using STRIDE in a Smart Contract
-
(Included in full purchase)
Using PASTA in an EVM
-
(Included in full purchase)
Using PASTA in a Smart Contract
-
(Included in full purchase)
Using NIST Framework in a Smart Contract
-
(Included in full purchase)
Its OK to combine Threat Models
-
(Included in full purchase)
Section Quiz
-
2
Where Consensus Security is still Evolving
-
(Included in full purchase)
Legacy Attacks
-
(Included in full purchase)
Baking in security from Day 1
-
(Included in full purchase)
Economic Attacks in Consensus Systems
-
(Included in full purchase)
Long Range Attacks
-
(Included in full purchase)
Restaking
-
(Included in full purchase)
Emerging threats in Blockchain Security
-
(Included in full purchase)
Finality Reversion
-
(Included in full purchase)
Fork Choice Rule
-
(Included in full purchase)
Section Quiz
-
(Included in full purchase)
-
3
Modern Network Attack Vectors
-
(Included in full purchase)
Modern Blockchain Attack Vectors
-
(Included in full purchase)
Overview of Blockchain Layers
-
(Included in full purchase)
Blockchain Layers and Functions
-
(Included in full purchase)
PoS Attack Surfaces
-
(Included in full purchase)
Censorship and Compliance Attacks
-
(Included in full purchase)
Mempool Attacks
-
(Included in full purchase)
MEV Attacks
-
(Included in full purchase)
Oracle and Data Integrity Attacks
-
(Included in full purchase)
Restaking and Economic Attacks
-
(Included in full purchase)
Shared Security and Consensus Abstraction
-
(Included in full purchase)
Relay Builder and Centralization Attacks
-
(Included in full purchase)
Blockchain Based Malware
-
(Included in full purchase)
Click Fix and Clear Fake
-
(Included in full purchase)
Ether Hiding
-
(Included in full purchase)
Persistence Attacks
-
(Included in full purchase)
OpCodes for Blockchain Security Analysts
-
(Included in full purchase)
EVM OpCodes for Blockchain Security Analysts
-
(Included in full purchase)
Blockchain OpCode Case Study
-
(Included in full purchase)
Malware C&C in OpCodes
-
(Included in full purchase)
Cross Chain Bridge Attacks
-
(Included in full purchase)
Core Network Attacks
-
(Included in full purchase)
What does Quantum Computing change?
-
(Included in full purchase)
Fun networking Lab
-
(Included in full purchase)
AI Is transforming Blockchain Security
-
(Included in full purchase)
Section 3 Quiz
-
(Included in full purchase)
-
4
Dapp and Smart Contract Security
-
(Included in full purchase)
Security Requirements Engineering
-
(Included in full purchase)
NIST Blockchain
-
(Included in full purchase)
NIST Framework for Smart Contracts
-
(Included in full purchase)
Threat Modeling Solidity Best Practices
-
(Included in full purchase)
Secure Application Architecture
-
(Included in full purchase)
Solidity Programming Structures
-
(Included in full purchase)
Overview of Token Standards
-
(Included in full purchase)
TokenStandards
-
(Included in full purchase)
Types of Distributed Applications (dApps)
-
(Included in full purchase)
Working with Public API's
-
(Included in full purchase)
Working with Private API's
-
(Included in full purchase)
Example Overflows
-
(Included in full purchase)
Example Signature Replay
-
(Included in full purchase)
OpCodes
-
(Included in full purchase)
Delegate Call Storage Initialization
-
(Included in full purchase)
ERC 20 and Fake Tokens
-
(Included in full purchase)
ERC 777 Security Concerns for DeFi
-
(Included in full purchase)
The "onlyOwner" problem
-
(Included in full purchase)
Economic Soundness Audits
-
(Included in full purchase)
Technical Soundness Audits
-
(Included in full purchase)
Section 4 Quiz
-
(Included in full purchase)
-
5
DeFI and Economic Attacks
-
(Included in full purchase)
Advanced Oracle Manipulation
-
(Included in full purchase)
AMM Liquidity Manipulation
-
(Included in full purchase)
What is Uniswap?
-
(Included in full purchase)
Uniswap Version 2 Overview
-
(Included in full purchase)
Uniswap Version 3 overview
-
(Included in full purchase)
Cross Protocol Contagion
-
(Included in full purchase)
Delegated Token Economic Failure
-
(Included in full purchase)
Delegated Token Case Study
-
(Included in full purchase)
Economic Griefing
-
(Included in full purchase)
Economic Griefing Case Study
-
(Included in full purchase)
Flash Loan Attacks
-
(Included in full purchase)
Flash Loan Case Study
-
(Included in full purchase)
Governance Exploits
-
(Included in full purchase)
Incentive and Game Theory Failures
-
(Included in full purchase)
Mempool Bots and Economic Attacks
-
(Included in full purchase)
MEV Sandwich Attacks
-
(Included in full purchase)
MEV Sandwich attack Case Study
-
(Included in full purchase)
MEV Defense and Mitigation
-
(Included in full purchase)
MEV Mitigation Implementation
-
(Included in full purchase)
Stable Coins Failures
-
(Included in full purchase)
Stable Coin Case Study
-
(Included in full purchase)
Ghost Chains as an Attack Surface
-
(Included in full purchase)
Ghost Chain case study
-
(Included in full purchase)
Fun Opcode Project to do
-
(Included in full purchase)
Section Quiz
-
(Included in full purchase)
-
6
L2 and Cross Chain Security
-
(Included in full purchase)
Why Bridges Break
-
(Included in full purchase)
Why Bridges keep on Breaking
-
(Included in full purchase)
Bridge Case Study Wormhole Bridge
-
(Included in full purchase)
Bridge Message Attack
-
(Included in full purchase)
BNB Chain Reorg Case Study
-
(Included in full purchase)
Bridge Monitoring and Observability
-
(Included in full purchase)
Bridge Timing and Finality
-
(Included in full purchase)
Cross Domain MEV
-
(Included in full purchase)
Interop Stack
-
(Included in full purchase)
Interop Trust
-
(Included in full purchase)
l2 Bridge Architecture
-
(Included in full purchase)
l2 Token Account Failure
-
(Included in full purchase)
Nomad Case Study
-
(Included in full purchase)
Optimistic Rollup Bridge
-
(Included in full purchase)
Shared Sequencer
-
(Included in full purchase)
zkRollupBridge
-
(Included in full purchase)
Section Quiz
-
(Included in full purchase)
-
7
Hybrid and Off Chain Risks
-
(Included in full purchase)
The Visibility Paradox
-
(Included in full purchase)
Immutable Liability and Shadow Copies
-
(Included in full purchase)
Input Data Integrity and Delayed Disclosure
-
(Included in full purchase)
Off-Chain Storage and Pinning (IPCS, Arweave and Cloud Backends)
-
(Included in full purchase)
RPC Infrastructure
-
(Included in full purchase)
The Indexing layer and API Consistency
-
(Included in full purchase)
CI/CD, Dependency Chains, and Supply Chain Attacks
-
(Included in full purchase)
Cross-Chain bridges and Off-Chain Operator Risk
-
(Included in full purchase)
Calldata vs Blobs vs L2 Batch Posts
-
(Included in full purchase)
Frontend Fortification
-
(Included in full purchase)
Signature Hygiene and Transaction Trust
-
(Included in full purchase)
User-Side Infrastructure Security
-
(Included in full purchase)
Dangerous Browser Extensions
-
(Included in full purchase)
zk Off-Chain Ecosystem
-
(Included in full purchase)
RWA Token Security for Real World Assets
-
(Included in full purchase)
RWA Case Study
-
(Included in full purchase)
AI in Off-Chain Blockchain Operations
-
(Included in full purchase)
Unified Threat Model
-
(Included in full purchase)
Hybrid Trust Risk
-
(Included in full purchase)
Metadata Off-Chain Store
-
(Included in full purchase)
Section Quiz
-
(Included in full purchase)
-
8
Practical Defense
-
(Included in full purchase)
DevSecOps and a Culture of Security
-
(Included in full purchase)
Defensive Threat Modeling
-
(Included in full purchase)
Threat Model Audit Workflow
-
(Included in full purchase)
UPbit Circuit Breaker Case Study
-
(Included in full purchase)
Case Study Nation State - Lazarus Group
-
(Included in full purchase)
Avoiding Single Points of Failure (SPoF)
-
(Included in full purchase)
The Process of Upgrade Security
-
(Included in full purchase)
Data Protection
-
(Included in full purchase)
On-Off Chain Data Protection
-
(Included in full purchase)
Multi-Signature Attacks
-
(Included in full purchase)
Multi-Signature Defense
-
(Included in full purchase)
Security Gates
-
(Included in full purchase)
Run Time Monitoring
-
(Included in full purchase)
Using the SDLC in dApps
-
(Included in full purchase)
SDLC - Secrets And Keys
-
(Included in full purchase)
DAO Key Rotation Best Practices
-
(Included in full purchase)
DAO Admin Key Rotation Case Study
-
(Included in full purchase)
Using RBAC in Smart Contracts
-
(Included in full purchase)
Web3 CI/CD Pipeline
-
(Included in full purchase)
Section Quiz
-
(Included in full purchase)
-
9
Blockchain and AI today
-
(Included in full purchase)
Why AI is Part of Blockchain Security
-
(Included in full purchase)
How AI Changes Traditional Security Models
-
(Included in full purchase)
What is An AI Agent?
-
(Included in full purchase)
AI Tool Chains in Blockchain
-
(Included in full purchase)
New Trust Boundaries introduced by AI
-
(Included in full purchase)
Inputs and Prompt Attack Vectors
-
(Included in full purchase)
Output and Execution Vulnerabilities
-
(Included in full purchase)
Tooling Level Vulnerabilities
-
(Included in full purchase)
Agent Persistence and Scheduling
-
(Included in full purchase)
Reinforcement Learning Bots
-
(Included in full purchase)
AI Driven MEV Strategies
-
(Included in full purchase)
AI Augmented Arbitrage
-
(Included in full purchase)
Risks of over reliance on AI trading bots
-
(Included in full purchase)
LLM Assisted Development Pitfalls
-
(Included in full purchase)
Detecting AI Generated Malicous Code
-
(Included in full purchase)
Multi-Model Verification
-
(Included in full purchase)
AI and Oracles
-
(Included in full purchase)
RPC and Wallet Infrastructure
-
(Included in full purchase)
Wallet and AI products on the market
-
(Included in full purchase)
Cloud and Hybrid Infrastructure
-
(Included in full purchase)
Adversarial Nation State Activity
-
(Included in full purchase)
Autonomous Exploit Pipelines
-
(Included in full purchase)
Multi-Agent coordinated attacks
-
(Included in full purchase)
Defensive AI Security
-
(Included in full purchase)
Hardening AI Agents
-
(Included in full purchase)
AI Secure By Design
-
(Included in full purchase)
AI Bottle Necks
-
(Included in full purchase)
EVM Bench and other AI automation tools
-
(Included in full purchase)
AI Case Study Lazarus
-
(Included in full purchase)
AI Threat Matrix
-
(Included in full purchase)
Case Study AII Generated Vault Exploit (theory)
-
(Included in full purchase)
Output Execution Side Vulnerabilities
-
(Included in full purchase)
World Models
-
(Included in full purchase)
Section Quiz
-
(Included in full purchase)
-
10
Future Trends
-
(Included in full purchase)
The Future of Fraud, Regulation and Forensics
-
(Included in full purchase)
The Future of OFAC Sanctions and Crypto
-
(Included in full purchase)
Future Regulatory Expectations
-
(Included in full purchase)
Future SEC Engagement with Blockchain
-
(Included in full purchase)
SEC Enforcement Overview
-
(Included in full purchase)
SEC Case Studies
-
(Included in full purchase)
Ethereum Planned Upgrades
-
(Included in full purchase)
How those planned upgrades change security
-
(Included in full purchase)
Nation State Concerns
-
(Included in full purchase)
World Models
-
(Included in full purchase)
Future trap and trace issues
-
(Included in full purchase)
Section Quiz
-
(Included in full purchase)
-
11
Final Exam
-
(Included in full purchase)
Final Exam Open Book Open Note
-
(Included in full purchase)
What people are saying
Unlock the power of trust and confidence with our Blockchain Security Associate program — transforming careers and securing futures.
Bleeding edge update that answers all the questions you didn’t know you had.
Seattle, WA
Add a clear and direct call-to-action
Seal the deal with a bit more content that supports the main call to action.