Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CERTIFIED WEB 3.0 SECURITY PROFESSIONAL
MODULE 1 - FUNDAMENTALS OF 3.0, BLOCK CHAIN, CRYPTOGRAPHY, ETHEREUM NETWORK & STANDARDS
Chapter 0 (14:38)
Chapter 1 (12:48)
Chapter 2 (17:33)
Chapter 3 (6:49)
Chapter 4 (24:15)
Chapter 5 (70:19)
MODULE 2 - SOLIDITY PROGRAMMING & FUNDAMENTALS
Chapter 0 - Introduction to Solidity & Smart Contracts
Chapter 0.1 - What is Solidity & Headers & Remix (10:14)
Chapter 0.2 - Functions (4:07)
Chapter 0.2 - Functions
Chapter 0.3 - Events (4:50)
Chapter 0.4 - Error Declaration (7:47)
Chapter 1 - Value Types
Chapter 1.1 - Data Type 01
Chapter 1.2 - Data Type 02 (2:01)
Chapter 1.3 - Data Type 03
Chapter 1.4 - Data Type 04 (2:33)
Chapter 1.5 - Ethereum Units (8:20)
Chapter 1.6 - Visibility (6:53)
CHAPTER 2 - FUNCTIONS, PARAMETERS, LOOPS
Chapter 2.1 - Functions - Part 1 (1:26)
Chapter 2.2 - Functions - Part 2 (1:45)
Chapter 2.3 - Functions Variables & Returns (4:09)
Chapter 2.4 - Payable Function (1:48)
Chapter 2.5 - Functions (View, Pure) (7:01)
Chapter 2.6 - Foor Loop (6:58)
Chapter 2.7 - If Loop (3:04)
CHAPTER 3 - ARRAYS, MAPPING, STRUCT
Chapter 3.1 - Arrays
Chapter 3.2 - Arrays (Push, Pop) (3:00)
Chapter 3.3 - Constructor (3:09)
Chapter 3.4 - Modifier & Require (4:42)
Chapter 3.5 - Mapping & Nested Mapping (8:49)
Chapter 3.6 - Reference Types (7:13)
Chapter 3.7 - Struct - 01 (2:59)
Chapter 3.8 - Struct - 02 (6:58)
Chapter 3.9 - Elementary Conversion (4:11)
CHAPTER 4 - GLOBAL VARIABLE, ABI
Chapter 4.1 - Global Variable (2:42)
Chapter 4.2 - Global Variable - Part 2 (3:38)
Chapter 4.3 - Global Variables - Part 3 (4:03)
Chapter 4.4 - Global Variable - Abi Encode (2:40)
Chapter 4.5 - Global Variable - Block.Difficulty (3:19)
Chapter 4.6 - Block.Gaslimit (2:56)
Chapter 4.7 - Block.timestomp (2:49)
Chapter 4.8 - Gas Limit (3:22)
Chapter 4.9 - Msg.data (1:54)
Chapter 4.10 - msg.sender (4:57)
Chapter 4.11 - msg.value (2:35)
Chapter 4.12 - tx.origin (4:29)
Chapter 4.13 - ABI Decode (3:56)
Chapter 4.14 - Self destruct (2:11)
MODULE 3- SOLIDITY HACKING
01 - Reentrancy (26:15)
02 - Overflow & Underflow (23:02)
03- Self Destruct (18:38)
04 - Delegate Call #01 (30:13)
05 - Delegate Call #02
06 - Denial of Service Attack
07 - Phishing with tx.origin
08 - Hiding Malicious Code
09 - Honeypot
10 - Front Running
11 - Block TimeStamp Manipulation
12 - Signature Replay Attack
13 - Contract with Zero Code Size
14 - Tornado Cash Hack
15 - Deploy 2 Contracts in the Same Address
16-Fallback
17-Smart Contract Upgrades
18-Gas Limit
19 - Malicious Library Attack
20 - Generating Random Number Part 1
21 - TimeStamp Dependance
22 - Delegate Calls
23 - Incorrect Access Control
24 - Outdated Compiler
25 - Miss use of Send
26 - Re-Entrancy Attack
MODULE 4 - LABS
#1 - Fallback
#2 - Fallout
#3 - Coin Flip
#4 - Telephone
#5 - Token
#6 - Delegation
#7 - Force
#8 - Vault
#9 - Elevator
#10 - Privacy
#11 - Gatekeeper-2
#12 - NaughtCoin
#14 - Magic Number
MODULE 5 - GAS OPTIMIZATION TECHNIQUES
Introduction to Gaz Optimization Technique
01 - Gaz Optimization Technique
02 - Gaz Optimization Technique
03 - Gaz Optimization Technique
04 - Gaz Optimization Technique
05 - Gaz Optimization Technique
06 - Gaz Optimization Technique
07 - Gaz Optimization Technique
08 - Gaz Optimization Technique
09 - Gaz Optimization Technique
01 - Gaz Optimization Technique
10 - Gaz Optimization Technique
11 - Gaz Optimization Technique
12 - Gaz Optimization Technique
13 - Gaz Optimization Technique
14 - Gaz Optimization Technique
15 - Gaz Optimization Technique
16 - Gaz Optimization Technique
17 - Gaz Optimization Technique
18 - Gaz Optimization Technique
19 - Gaz Optimization Technique
20 - Gaz Optimization Technique
21 - Gaz Optimization Technique
Teach online with
24 - Outdated Compiler
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock