CERTIFIED WEB 3.0 SECURITY PROFESSIONAL
Welcome to the cutting-edge world of web security in the era of Web 3.0! The Certified Web 3.0 Security Professional course is designed to equip you with the knowledge, skills, and expertise required to safeguard the next generation of web applications and systems. In this comprehensive training program, you will dive deep into the intricacies of securing decentralized, blockchain-based, and distributed applications, ensuring robust protection against evolving cyber threats. Smart Contract Security and Optimizing your code for security is the main essence of this complete course.

Course Highlights
- 18+ Hours of Learnings
- 50+ Labs
- Hands on Experience with Ethereum and Tokens
- Mixture of Programming and Real time Attacks.
- Optimization Techniques
Course Highlights
18+ Hours of Learnings
50+ Labs
Hands on Experience with Ethereum and Tokens
Mixture of Programming and Real time Attacks.
Optimization Techniques
Key Learning Objectives:
- To Understand Web 3.0
- To Learn Fundamentals of Blockchain & Cryptography
- To Know about Ethereum & Standards
- Ability to understand the Design Principles of Smart Contracts
- Understanding the Importance of Security Audits of Smart Contracts
- To learn Programming Solidity Language
- To learn the Best Practices of Smart Contract programming
Who is it For?
- Application Security Engineer
- Web 2.0 Security Engineer
- Product Security Engineer/Analyst
- Web3 Community Manager
- Web3 Legal Consultant
- Smart Contract Auditor
- Web3 Project Manager
- Blockchain Developer
- Decentralized Finance (DeFi) Specialist
- Web3 Security Engineer
- Blockchain Architect
- IT Security Administrator
- Security Administrator
- Vulnerability Assessment Analyst
- Solution Architect
Curriculum
- Chapter 0 - Introduction to Solidity & Smart Contracts
- Chapter 0.1 - What is Solidity & Headers & Remix (10:14)
- Chapter 0.2 - Functions (4:07)
- Chapter 0.2 - Functions
- Chapter 0.3 - Events (4:50)
- Chapter 0.4 - Error Declaration (7:47)
- Chapter 1 - Value Types
- Chapter 1.1 - Data Type 01
- Chapter 1.2 - Data Type 02 (2:01)
- Chapter 1.3 - Data Type 03
- Chapter 1.4 - Data Type 04 (2:33)
- Chapter 1.5 - Ethereum Units (8:20)
- Chapter 1.6 - Visibility (6:53)
- CHAPTER 2 - FUNCTIONS, PARAMETERS, LOOPS
- Chapter 2.1 - Functions - Part 1 (1:26)
- Chapter 2.2 - Functions - Part 2 (1:45)
- Chapter 2.3 - Functions Variables & Returns (4:09)
- Chapter 2.4 - Payable Function (1:48)
- Chapter 2.5 - Functions (View, Pure) (7:01)
- Chapter 2.6 - Foor Loop (6:58)
- Chapter 2.7 - If Loop (3:04)
- CHAPTER 3 - ARRAYS, MAPPING, STRUCT
- Chapter 3.1 - Arrays
- Chapter 3.2 - Arrays (Push, Pop) (3:00)
- Chapter 3.3 - Constructor (3:09)
- Chapter 3.4 - Modifier & Require (4:42)
- Chapter 3.5 - Mapping & Nested Mapping (8:49)
- Chapter 3.6 - Reference Types (7:13)
- Chapter 3.7 - Struct - 01 (2:59)
- Chapter 3.8 - Struct - 02 (6:58)
- Chapter 3.9 - Elementary Conversion (4:11)
- CHAPTER 4 - GLOBAL VARIABLE, ABI
- Chapter 4.1 - Global Variable (2:42)
- Chapter 4.2 - Global Variable - Part 2 (3:38)
- Chapter 4.3 - Global Variables - Part 3 (4:03)
- Chapter 4.4 - Global Variable - Abi Encode (2:40)
- Chapter 4.5 - Global Variable - Block.Difficulty (3:19)
- Chapter 4.6 - Block.Gaslimit (2:56)
- Chapter 4.7 - Block.timestomp (2:49)
- Chapter 4.8 - Gas Limit (3:22)
- Chapter 4.9 - Msg.data (1:54)
- Chapter 4.10 - msg.sender (4:57)
- Chapter 4.11 - msg.value (2:35)
- Chapter 4.12 - tx.origin (4:29)
- Chapter 4.13 - ABI Decode (3:56)
- Chapter 4.14 - Self destruct (2:11)
- 01 - Reentrancy (26:15)
- 02 - Overflow & Underflow (23:02)
- 03- Self Destruct (18:38)
- 04 - Delegate Call #01 (30:13)
- 05 - Delegate Call #02
- 06 - Denial of Service Attack
- 07 - Phishing with tx.origin
- 08 - Hiding Malicious Code
- 09 - Honeypot
- 10 - Front Running
- 11 - Block TimeStamp Manipulation
- 12 - Signature Replay Attack
- 13 - Contract with Zero Code Size
- 14 - Tornado Cash Hack
- 15 - Deploy 2 Contracts in the Same Address
- 16-Fallback
- 17-Smart Contract Upgrades
- 18-Gas Limit
- 19 - Malicious Library Attack
- 20 - Generating Random Number Part 1
- 21 - TimeStamp Dependance
- 22 - Delegate Calls
- 23 - Incorrect Access Control
- 24 - Outdated Compiler
- 25 - Miss use of Send
- 26 - Re-Entrancy Attack
- Introduction to Gaz Optimization Technique
- 01 - Gaz Optimization Technique
- 02 - Gaz Optimization Technique
- 03 - Gaz Optimization Technique
- 04 - Gaz Optimization Technique
- 05 - Gaz Optimization Technique
- 06 - Gaz Optimization Technique
- 07 - Gaz Optimization Technique
- 08 - Gaz Optimization Technique
- 09 - Gaz Optimization Technique
- 01 - Gaz Optimization Technique
- 10 - Gaz Optimization Technique
- 11 - Gaz Optimization Technique
- 12 - Gaz Optimization Technique
- 13 - Gaz Optimization Technique
- 14 - Gaz Optimization Technique
- 15 - Gaz Optimization Technique
- 16 - Gaz Optimization Technique
- 17 - Gaz Optimization Technique
- 18 - Gaz Optimization Technique
- 19 - Gaz Optimization Technique
- 20 - Gaz Optimization Technique
- 21 - Gaz Optimization Technique
Author
We are one of the world’s leading certification training providers.
We provide online training in disciplines such as Cyber Security, Cloud Computing, Project Management, Digital Marketing, and Data Science among others, where technologies and best practices are changing rapidly and demand for qualified candidates significantly exceeds supply.
Based in UAE, Delhi NCR, India, we have helped over one million professionals and companies across 150+ countries get trained, acquire certifications, and upskill their employees.
Our training courses are designed and updated by 150+ renowned industry experts. Our blended learning approach combines online classes, instructor-led live virtual classrooms, project work, and 24/7 teaching assistance. Our vibrant community of experts and certified professionals is a powerful resource pool of tips, tricks, and insightful advice. More than 40 global training organizations have recognized us as an official provider of certification training.
