![]() |
Solidity For Qa, Devsecops And Tpms - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Solidity For Qa, Devsecops And Tpms (/Thread-Solidity-For-Qa-Devsecops-And-Tpms) |
Solidity For Qa, Devsecops And Tpms - AD-TEAM - 02-05-2025 ![]() Solidity For Qa, Devsecops And Tpms Published 11/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 6.48 GB | Duration: 10h 52m QA, DevSecOps, and TPM, Best Practices for Developing Hack-Resistant Ethereum Applications [b]What you'll learn[/b] Identify common security vulnerabilities in Solidity smart contracts like reentrancy, integer overflows, and access control issues. Learn about secure coding standards like checks-effects-interactions to prevent reentrancy and race conditions. Follow best practices like code simplicity, modularization, and threat modeling when architecting smart contracts. Analyze past hacks and exploits to improve understanding of real-world Solidity security failures. Learn about DevOps and SecDevOps to minimize security and functional issues in code [b]Requirements[/b] Success in a Solidity security course, which focuses on an awareness of what needs to be completed to secure smart contracts and decentralized applications (DApps) built on blockchain platforms like Ethereum. This skill set requires a combination of technical skills, foundational knowledge, and the right mindset for change and problem solving. [b]Description[/b] Course DescriptionThis "QA and SecDevOps Best Practices for Developing Hack-Resistant Ethereum Applications" course is designed to equip students with the skills and knowledge to develop secure and robust smart contracts and decentralized applications (DApps) on blockchain platforms like Ethereum. In today's rapidly evolving blockchain landscape, security is paramount, and this course focuses on teaching students how to identify, prevent, and mitigate common vulnerabilities and threats that can jeopardize the integrity and value of blockchain-based systems.This course is focused on QA, DevSecOps, and Technical Project Managers and their roles and knowledge for developing smart contracts on an Ethereum style blockchain. Course Highlights:Solidity Fundamentals: Students will start with a strong foundation in Solidity, the programming language used for Ethereum smart contracts. They will learn how to write and deploy basic contract agreements, understand the Ethereum Virtual Machine (EVM), and explore the intricacies of blockchain development.Security Best Practices: The course will explore security best practices for smart contract development. Topics include access control, input validation, secure data storage, and protection against reentrancy attacks. Students will also examine real-world case studies of smart contract vulnerabilities and breaches.By the end of the "QA and SecDevOps Best Practices for Developing Hack-Resistant Ethereum Applications" course, students will have a deep understanding of Solidity programming, blockchain security principles, and the ability to develop smart contracts and DApps that adhere to industry best practices. Whether students are aspiring blockchain developers, auditors, or security professionals, this course provides the knowledge and skills necessary to securely navigate blockchain technology's exciting and ever-evolving world. Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 Navigating the uDemy video Lecture 3 Book for this course Section 2: Security Requirements Engineering Lecture 4 Security Modeling Lecture 5 What is Security Requirements Engineering Lecture 6 Abuse Case Modeling Lecture 7 Secure Case Modeling Lecture 8 SQUARE Lecture 9 OCTAVE Lecture 10 Downloadable Document Templates Section 3: Secure Design Principles Lecture 11 Threat Modeling Lecture 12 Secure Application Architecture Lecture 13 Proxy Contracts Section 4: Secure Coding Practices Lecture 14 Input Validation Lecture 15 Input Validation Examples Lecture 16 Authorization and Authentication Lecture 17 Contract Proxy Lecture 18 Example Setting up RBAC in a Smart Contract Lecture 19 Cryptography Lecture 20 Session Management Lecture 21 Error Handling Lecture 22 The Defensive Programming Mindset Lecture 23 Proof of Work - Consensus Protocols Lecture 24 Proof of Stake - Consensus Protocols Lecture 25 Other types of Consensus Protocols Section 5: Static and Dynamic Application Security Testing (SAST & DAST) Lecture 26 SAST and DAST Lecture 27 Static Application Testing Lecture 28 Manual Code Review Lecture 29 Dynamic Application Testing Lecture 30 Automated Security Testing Lecture 31 Proxy Based Security Testing Tools Lecture 32 Pre-Deployment Checks Lecture 33 Using a Test Environment Lecture 34 Post-Deployment Checks Section 6: Security Levels Lecture 35 Security Levels - Network Lecture 36 Security Levels - Host Lecture 37 Security Levels - Web Lecture 38 Security Levels - Database Lecture 39 Security Levels - Monitoring and Maintenance Lecture 40 Security Levels - Audit Lecture 41 Security Levels - Oracles and 3rd party systems Lecture 42 How to monitor your contract Lecture 43 Cost Management Lecture 44 Wallet Security Lecture 45 Vault Security Lecture 46 Vault or Wallet Lecture 47 Mnemonic Keys Lecture 48 Mnemonic Reconstruction Lecture 49 BIP-39 Overview Lecture 50 Off-Chain Workers Section 7: Secure Programming for QA, DevSecOps and TPMs Lecture 51 ERCs Lecture 52 Blockchain Security Vendors Lecture 53 Past Attacks Lecture 54 What is Open Zeppelin Lecture 55 Open Zeppelin Templates Lecture 56 Using Open Zeppelin Libraries Lecture 57 Breaking Changes Section 8: Common Attacks - Things to know and test for Lecture 58 Using live examples from the internet for test ideas Lecture 59 Bypass Contract Checks Lecture 60 Rentracy Example Lecture 61 Check Effects Lecture 62 Collisions Lecture 63 Contract Size Check Lecture 64 Delegate Call Lecture 65 Denial of Service Lecture 66 External Calls Lecture 67 Malicious Code Lecture 68 Front Running Lecture 69 Testing Governance Controls Lecture 70 Testing Governance Wallets Lecture 71 Finding Hidden Malicious Code Lecture 72 On Chain Data Lecture 73 Oracle Manipulation Lecture 74 Overflow/Underflow Lecture 75 Private Data via API Lecture 76 Public Data via API Lecture 77 Randomness Lecture 78 Self Destruct Lecture 79 Signature Replay Lecture 80 Time Lecture 81 DevOps Lecture 82 DevSecOps Lecture 83 QA process Section 9: Finish Lecture 84 Thank you for taking this course Everyone, but a background in CEH, SecDevOps, or QA would be beneficial ![]() TurboBit RapidGator AlfaFile |