Length: 2 Days
Print Friendly, PDF & Email

Blockchain Security Workshop

Blockchain Security Workshop is a 2-day training program focusing on Blockchain security. Participants will learn how to use a comprehensive risk management framework and system applied to  blockchain network.

Blockchain is a Distributed Ledger Technology (DLT) to create trust in an untrusting ecosystem. All nodes or members can record, pass along and view any transactional data that is encrypted onto their blockchain. Using cybersecurity frameworks, assurance services and best practices, we can reduce risks against attacks and fraud.

Blockchain technology enables decentralization, with the participation of members and nodes across a distributed network. Blockchain technologies differ in some critical security aspects.

Networks are typically either public or private, depending on participation. permissioned or permissionless, or how the participants gain access to the network.

Who Should Attend

This course is designed for analysts, programmers, application developers, network engineers, hardware and software design engineers, managers, and employees with little or no blockchain security experience. The course is also useful for those who have experience with blockchain security but have never had any formal training on the standard.

What You Will Learn

  • An overview of blockchain technology
  • A summary of blockchain security tools and applications
  • How to implement blockchain security on a platform or public/private networks
  • The difference between Bitcoin and blockchain for business
  • Blockchain network and application security
  • Private vs. public blockchain networks
  • Permissionless blockchains with no restrictions on processors
  • Permissioned blockchains with limited to a select set of users who are granted identities using certificates
  • Cyberattacks and fraud
  • Code exploitation
  • Stolen keys
  • Computer hacking
  • Insider hacks
  • Phishing attacks
  • Routing attacks
  • Sybil attacks
  • Enforce security controls for blockchain
  • Apply conventional security controls
  • Enforce business controls for blockchain
  • Blockchain security for the enterprise
  • Identity and access management
  • Key management
  • Data privacy
  • Secure communication
  • Smart contract security
  • Governance model for participating organizations or members
  • Regulatory requirements
  • Disaster recovery plan for the blockchain participants
  • Security posture for blockchain clients for participation
  • Blockchain block collisions
  • Security controls that mitigate the risks and threats

 

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.