17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Blockchain And Smart Contract Security, Hacking And Audit
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Language: English | Size: 2.82 GB | Duration: 5h 46m
Learn how to identify vulnerabilities on Blockchain & mitigate them , Hack Smart Contracts , Perform an Audit Review...
What you'll learn
Understand Network and Consensus and Smart Contract vulnerabilities
Understand smart contract attacks Vector in depth Theory with Practical implementation
Identify Smart contract vulnerabilities in a given Smart contract
Learn how to Hack Smart contracts with Practical implementation
Understand the different techniques used to conduct a solid Smart contract Audit review
Perform a full Smart Contract Security Audit review
Manipulate necessary tools to help you perform an Audit
categorize vulnerabilities and write an Audit report
Requirements
Have a Basic understanding of how Blockchain and smart contract work
Basic Solidity programing language knowledge practical implementation not mandatory
Security mindset
Passion and dedication to learn new Tech trend
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1 - Section 1 Introduction to Smart contract security audit course/1 - Course Overview.mp4
78.7 MB
~Get Your Files Here !/1 - Section 1 Introduction to Smart contract security audit course/2 - Why Security matters in Blockchain and smart contract space.mp4
9.7 MB
~Get Your Files Here !/1 - Section 1 Introduction to Smart contract security audit course/3 - Smart contract Auditor Career path and salaries.mp4
8.3 MB
~Get Your Files Here !/10 - Section 10 Capstone project Perform a full Smart Contract audit on Wallet/30 - Vulnerabilities classifications.mp4
104.4 MB
~Get Your Files Here !/10 - Section 10 Capstone project Perform a full Smart Contract audit on Wallet/31 - Understanding system and business requirement for the Wallet Smart contract.mp4
13.1 MB
~Get Your Files Here !/10 - Section 10 Capstone project Perform a full Smart Contract audit on Wallet/32 - Basic Manual review and Structure of the Code.mp4
36.9 MB
~Get Your Files Here !/10 - Section 10 Capstone project Perform a full Smart Contract audit on Wallet/33 - Deep Manual review Critical vulnerabilities Found.mp4
61.8 MB
~Get Your Files Here !/10 - Section 10 Capstone project Perform a full Smart Contract audit on Wallet/34 - Deep manual review Low and informational vulnerabilities found.mp4
61.9 MB
~Get Your Files Here !/10 - Section 10 Capstone project Perform a full Smart Contract audit on Wallet/35 - Mitigation Of The Critical Vulnerabilities.mp4
39.2 MB
~Get Your Files Here !/10 - Section 10 Capstone project Perform a full Smart Contract audit on Wallet/36 - Presentation of the Automated tool for reviewing security issue.mp4
96.1 MB
~Get Your Files Here !/10 - Section 10 Capstone project Perform a full Smart Contract audit on Wallet/37 - Finding more Bugs with the Formal verification tool.mp4
91.3 MB
~Get Your Files Here !/11 - Section 11 Exercise/38 - Perform an audit on this ERC20 Token and find the Different issues.html
4.1 KB
~Get Your Files Here !/2 - Section 2 Consensus based Vulnerabilities Bitcoin Ethereum BnB Chain Polygon/4 - Understandig Proof Of Work Concept.mp4
91.5 MB
~Get Your Files Here !/2 - Section 2 Consensus based Vulnerabilities Bitcoin Ethereum BnB Chain Polygon/5 - Hash Rate and 51 Attack.mp4
96.8 MB
~Get Your Files Here !/2 - Section 2 Consensus based Vulnerabilities Bitcoin Ethereum BnB Chain Polygon/6 - 51 Attack Explained.mp4
92.3 MB
~Get Your Files Here !/2 - Section 2 Consensus based Vulnerabilities Bitcoin Ethereum BnB Chain Polygon/7 - Nakamoto Coefficient and 51 Attack.mp4
126.3 MB
~Get Your Files Here !/2 - Section 2 Consensus based Vulnerabilities Bitcoin Ethereum BnB Chain Polygon/8 - How 51 Attack can be reduced to less than 51 Attack.mp4
85.5 MB
~Get Your Files Here !/2 - Section 2 Consensus based Vulnerabilities Bitcoin Ethereum BnB Chain Polygon/9 - 49 Attack.mp4
57.3 MB
~Get Your Files Here !/3 - Section 3 Denial of Service attack Attack Network and transaction Level/10 - Understanding Traditional Denial of Service Attack.mp4
81.8 MB
~Get Your Files Here !/3 - Section 3 Denial of Service attack Attack Network and transaction Level/11 - Denial of Service Attack on Blockchain Transaction flooding.mp4
34.3 MB
~Get Your Files Here !/3 - Section 3 Denial of Service attack Attack Network and transaction Level/12 - Distributed Denial of Service DDOS Attack.mp4
7.9 MB
~Get Your Files Here !/4 - Section 4 Smart Contract Attack Vector Denial of Service/13 - Denial of Service attack on a Bank Smart Contract Theory explained.mp4
53.1 MB
~Get Your Files Here !/4 - Section 4 Smart Contract Attack Vector Denial of Service/14 - Denial of service attack on Bank Smart contract Practical Example Hacker.mp4
72.4 MB
~Get Your Files Here !/4 - Section 4 Smart Contract Attack Vector Denial of Service/15 - Denial of service Attack on Bank Contract Practical Example Victim contract.mp4
91.3 MB
~Get Your Files Here !/5 - Section 5 Smart Contract Attack vector Reentrancy Attack/16 - Reentrancy Attack Theory Explained.mp4
80.6 MB
~Get Your Files Here !/5 - Section 5 Smart Contract Attack vector Reentrancy Attack/17 - Victim contract programming part 1.mp4
52.1 MB
~Get Your Files Here !/5 - Section 5 Smart Contract Attack vector Reentrancy Attack/18 - Victim contract programming part 2.mp4
72.6 MB
~Get Your Files Here !/5 - Section 5 Smart Contract Attack vector Reentrancy Attack/19 - Creating Hacker Smart Contract.mp4
59.7 MB
~Get Your Files Here !/5 - Section 5 Smart Contract Attack vector Reentrancy Attack/20 - Launching the attack on Victim contract.mp4
36.3 MB
~Get Your Files Here !/5 - Section 5 Smart Contract Attack vector Reentrancy Attack/21 - Mitigating the Attack.mp4
56.4 MB
~Get Your Files Here !/6 - Section6 Smart Contract Attack RugPull Pump Dump schemes Limit sell order/22 - Understanding the different type RugPull Attacks.mp4
184.2 MB
~Get Your Files Here !/6 - Section6 Smart Contract Attack RugPull Pump Dump schemes Limit sell order/23 - RugPull attacks on smart Contract.mp4
29.2 MB
~Get Your Files Here !/7 - Section7 Smart Contract Attack vector Front Running Signature replay Attack/24 - Front Running Attacks.mp4
93 MB
~Get Your Files Here !/7 - Section7 Smart Contract Attack vector Front Running Signature replay Attack/25 - Signature replay Attacks.mp4
126.3 MB
~Get Your Files Here !/8 - Section 8 DeFi Decentralized Finance Concepts/26 - Liquidity pools AMM DEX.mp4
82.4 MB
~Get Your Files Here !/8 - Section 8 DeFi Decentralized Finance Concepts/27 - Flashloan Concept.mp4
109.2 MB
~Get Your Files Here !/9 - Section 9 Smart contract audit review process and methodology/28 - Audit process phase one Business requirement Visual tools Manual review.mp4
175.9 MB
~Get Your Files Here !/9 - Section 9 Smart contract audit review process and methodology/29 - Audit process phase Static dynamic analysis formal verification.mp4