CERTIFIED WEB 3.0 SECURITY PROFESSIONAL

Welcome to the cutting-edge world of web security in the era of Web 3.0! The Certified Web 3.0 Security Professional course is designed to equip you with the knowledge, skills, and expertise requir...

  • All levels
  • English

Course Description

Welcome to the cutting-edge world of web security in the era of Web 3.0! The Certified Web 3.0 Security Professional course is designed to equip you with the knowledge, skills, and expertise required to safeguard the next generation of web applications and systems. In this comprehensive training program, you will dive deep into the intricacies of securing decentralized, blockchain-based, and...

Welcome to the cutting-edge world of web security in the era of Web 3.0! The Certified Web 3.0 Security Professional course is designed to equip you with the knowledge, skills, and expertise required to safeguard the next generation of web applications and systems. In this comprehensive training program, you will dive deep into the intricacies of securing decentralized, blockchain-based, and distributed applications, ensuring robust protection against evolving cyber threats. Smart Contract Security and Optimizing your code for security is the main essence of this complete course. - Key Learning Objectives: 1. To Understand Web 3.0 2. To Learn Fundamentals of Blockchain & Cryptography 3. To Know about Ethereum & Standards 4. Ability to understand the Design Principles of Smart Contracts 5. Understanding the Importance of Security Audits of Smart Contracts 6. To learn Programming Solidity Language 7. To learn the Best Practices of Smart Contract programming - Who is it For? - Application Security Engineer - Web 2.0 Security Engineer - Product Security Engineer/Analyst - Web3 Community Manager - Web3 Legal Consultant - Smart Contract Auditor - Web3 Project Manager - Blockchain Developer - Decentralized Finance (DeFi) Specialist - Web3 Security Engineer - Blockchain Architect - IT Security Administrator - Security Administrator - Vulnerability Assessment Analyst - Solution Architect

What you’ll learn
  • 18+ Hours of Learnings
  • 50+ Labs
  • Hands on Experience with Ethereum and Tokens
  • Mixture of Programming and Real time Attacks.
  • Optimization Techniques

Covering Topics

1
FUNDAMENTALS OF 3.0, BLOCK CHAIN, CRYPTOGRAPHY, ETHEREUM NETWORK & STANDARDS

2
Introduction to Solidity & Smart Contracts

3
Value Types

4
FUNCTIONS, PARAMETERS, LOOPS

5
ARRAYS, MAPPING, STRUCT

6
GLOBAL VARIABLE, ABI

7
SOLIDITY HACKING

8
Introduction to Labs

9
Introduction to Gaz Optimization Technique

Curriculum

      MODULE 1 - FUNDAMENTALS OF 3.0, BLOCK CHAIN, CRYPTOGRAPHY, ETHEREUM NETWORK & STANDARDS,
    
     Chapter 0 (14:38)
     Chapter 1 (12:48)
     Chapter 2 (17:33)
     Chapter 3 (6:49)
     Chapter 4 (24:15)
     Chapter 5 (70:19)
      MODULE 2 - SOLIDITY PROGRAMMING & FUNDAMENTALS
    
     Chapter 0 - Introduction to Solidity & Smart Contracts
    
     Chapter 0.1 - What is Solidity & Headers & Remix (10:14)
     Chapter 0.2 - Functions (4:07)
     Chapter 0.3 - Events (4:50)
     Chapter 0.4 - Error Declaration (7:47)
    
     Chapter 1 - Value Types
    
     Chapter 1.1 - Data Type 01 (5:30)
     Chapter 1.2 - Data Type 02 (2:01)
     Chapter 1.3 - Data Type 03 (3:58)
     Chapter 1.4 - Data Type 04 (2:33)
     Chapter 1.5 - Ethereum Units (8:20)
     Chapter 1.6 - Visibility (6:53)
    
     CHAPTER 2 - FUNCTIONS, PARAMETERS, LOOPS
    
     Chapter 2.1 - Functions - Part 1 (1:45)
     Chapter 2.2 - Functions - Part 2 (1:26)
     Chapter 2.3 - Functions Variables & Returns (4:09)
     Chapter 2.4 - Payable Function (1:48)
     Chapter 2.5 - Functions (View, Pure) (7:01)
     Chapter 2.6 - Foor Loop (6:58)
     Chapter 2.7 - If Loop (3:04)
    
     CHAPTER 3 - ARRAYS, MAPPING, STRUCT
    
     Chapter 3.1 - Arrays (6:45)
     Chapter 3.2 - Arrays (Push, Pop) (3:00)
     Chapter 3.3 - Constructor (3:09)
     Chapter 3.4 - Modifier & Require (4:42)
     Chapter 3.5 - Mapping & Nested Mapping (8:49)
     Chapter 3.6 - Reference Types (7:13)
     Chapter 3.7 - Struct - 01 (2:59)
     Chapter 3.8 - Struct - 02 (6:58)
     Chapter 3.9 - Elementary Conversion (4:11)
    
     CHAPTER 4 - GLOBAL VARIABLE, ABI
    
     Chapter 4.1 - Global Variable (2:42)
     Chapter 4.2 - Global Variable - Part 2 (3:38)
     Chapter 4.3 - Global Variables - Part 3 (4:03)
     Chapter 4.4 - Global Variable - Abi Encode (2:40)
     Chapter 4.5 - Global Variable - Block.Difficulty (3:19)
     Chapter 4.6 - Block.Gaslimit (2:56)
     Chapter 4.7 - Block.timestomp (2:49)
     Chapter 4.8 - Gas Limit (3:22)
     Chapter 4.9 - Msg.data (1:54)
     Chapter 4.10 - msg.sender (4:57)
     Chapter 4.11 - msg.value (2:35)
     Chapter 4.12 - tx.origin (4:29)
     Chapter 4.13 - ABI Decode (3:56)
     Chapter 4.14 - Self destruct (2:11)
      MODULE 3- SOLIDITY HACKING
    
     01 - Reentrancy (26:15)
     02 - Overflow & Underflow (23:02)
     03- Self Destruct (18:38)
     04 - Delegate Call #01
     05 - Delegate Call #02 (19:59)
     06 - Denial of Service Attack (22:16)
     07 - Phishing with tx.origin (20:35)
     08 - Hiding Malicious Code (9:17)
     09 - Honeypot (19:12)
     10 - Front Running (5:57)
     11 - Block TimeStamp Manipulation (3:47)
     12 - Signature Replay Attack (14:15)
     13 - Contract with Zero Code Size (8:35)
     14 - Tornado Cash Hack (6:21)
     15 - Deploy 2 Contracts in the Same Address (29:18)
     16-Fallback (8:35)
     17-Smart Contract Upgrades (10:51)
     18-Gas Limit (6:47)
     19 - Malicious Library Attack (5:00)
     20 - Generating Random Number Part 1 (5:28)
     21 - TimeStamp Dependance (4:30)
     22 - Delegate Calls (4:51)
     23 - Incorrect Access Control (6:39)
     24 - Outdated Compiler (4:34)
     25 - Miss use of Send (6:14)
     26 - Re-Entrancy Attack (8:39)
      MODULE 4 – LABS
    
     Introduction to Labs (14:04)
    
     #1 - Fallback (14:40)
     #2 - Fallout (12:01)
     #3 - Coin Flip (22:58)
     #4 - Telephone (17:09)
     #5 - Token (11:04)
     #6 - Delegation (7:32)
     #7 - Force (4:46)
     #8 - Vault (7:37)
     #9 - Elevator (9:07)
     #10 - Privacy (10:46)
     #11 - Gatekeeper-2 (9:07)
     #12 - NaughtCoin (10:46)
     #14 - Magic Number (22:13)
      MODULE 5 - GAS OPTIMIZATION TECHNIQUES
    
     Introduction to Gaz Optimization Technique (1:10)
     01 - Gaz Optimization Technique (3:54)
     02 - Gaz Optimization Technique (2:54)
     03 - Gaz Optimization Technique (3:30)
     04 - Gaz Optimization Technique (5:38)
     05 - Gaz Optimization Technique (5:00)
     06 - Gaz Optimization Technique (4:21)
     07 - Gaz Optimization Technique (5:29)
     08 - Gaz Optimization Technique (3:53)
     09 - Gaz Optimization Technique (6:38)
     10 - Gaz Optimization Technique (7:16)
     11 - Gaz Optimization Technique (4:14)
     12 - Gaz Optimization Technique (4:46)
     13 - Gaz Optimization Technique (4:07)
     14 - Gaz Optimization Technique (3:35)
     15 - Gaz Optimization Technique (4:31)
     16 - Gaz Optimization Technique (3:10)
     17 - Gaz Optimization Technique (3:23)
     18 - Gaz Optimization Technique (6:09)
     19 - Gaz Optimization Technique (3:36)
     20 - Gaz Optimization Technique (5:49)
     21 - Gaz Optimization Technique (5:30)

Frequently Asked Questions

Yes, you can start your Web 3.0 Security Career with CW3SP as it is not dependent on Web 2.0 as it is a different technology.

To start the course, you don't need any Programming knowledge in prior. Our CW3SP course has the basic to intermediate level learnings.

You can't expect Practical just like you have in other hacking Courses. You will have labs as Programming Exercises and Labs