Blockchain

The Blockchain Roadmap focuses on learning about blockchain technology, which enables transparent and secure storage and sharing of data. It also covers potential vulnerabilities in the field and essential practices for building a safer Web3 environment.

Smart Contract Security Roadmap: Gain a brief understanding of blockchain and smart contracts, and study the Ethereum Virtual Machine (EVM), which underpins Ethereum, along with the Solidity programming language.

Looking for cybersecurity courses for your organization? Train your team with Dreamhack.
Courses from this category
All courses in this category
Course title
Finished users
Taken time
Difficulty
(Click to sort ascending)
Price
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Return to Library
Learn the principles and methods of attack techniques used for bypassing canaries and exploiting code in libraries.
2,288 90 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
712 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
FAT32 and NTFS File Systems
FAT32 and NTFS file systems
209 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background: Binary
Describes what a binary is and the compilation process.
8,731 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Length Eextension Attack
Learn how to compute another hash value from one hash value using a length extension attack on the MD5 hash function.
104 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Format String Bug
Practice format string attacks using example code with format string bug vulnerability.
1,549 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: _IO_FILE Arbitrary Address Write
Learn an exploit that uses _IO_FILE to write a value to an arbitrary memory address.
490 90 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Firmware analysis
Learn firmware analysis.
104 60 minutes Normal
This course is opened to Enterprise. See the Enterprise introduction
Registry
Windows registry
127 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Docker
Learn Docker.
2,409 120 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
KAPE
Learn how to use KAPE
39 90 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Object Structure - WASM, Function
Learn the structure of WASMs and functions.
77 60 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
Background: React
Learn the essentials of React.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Electronics/Electrical
Describes electronics/electricity.
39 30 minutes Easy
This course is opened to Enterprise. See the Enterprise introduction
string
Learn how to identify and fix string input validation issues.
90 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
URL validation
Learn how to validate and patch weak URLs.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Practice Together: Firmware Emulation Practice
Work through the Firmware Emulation Exercise together.
74 90 minutes Normal
This course is opened to Enterprise. See the Enterprise introduction
[WHA-C] Background: Content Security Policy
Describes the Content Security Policy.
1,005 30 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Netcat
Learn Netcat.
2,726 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Blockchain and smart contracts
Understand what blockchain and smart contracts are.
30 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Numbers
Learn how to identify and fix numeric input validation issues.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Storage Collision
Read the Solidity code to find and exploit a storage conflict vulnerability in the proxy contract.
60 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-C] Exploit Tech: Relative Path Overwrite
Learn the principles and methods of Relative Path Overwrite.
277 30 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Header
Learn the goals and organization of the C Secure Coding Roadmap.
5 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Numeric Errors
Learn about bugs that can occur with numeric operations in Solidity contracts.
30 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Using safe libraries
Learn precautions to use the library safely.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Initializer & Selfdestruct
Read the Solidity code to find a vulnerability in the Initializer and attack it via selfdestruct.
60 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Unreliable data sources
Learn how to identify and fix issues with using data from untrusted sources.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Proxy Contracts
Learn what a proxy contract is in Smart Contracts.
30 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Syntax and characteristics of Solidity
Learn about Solidity, the leading language for writing smart contracts on Ethereum.
60 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Sender
Learn the characteristics of keywords related to sender used in Solidity contracts and the vulnerabilities associated with them.
30 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] Exercise: Command Injection Advanced
Solve Command Injection Advanced challenges together.
872 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Use secure JWTs
Identify issues you may encounter when using JWTs and how to fix them.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Hard-coded sensitive information
Learn the types of sensitive information that are hard-coded.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
IDOR
Learn about vulnerable cases where IDOR occurs and how to patch them.
60 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Lack of Rate Limiting
Learn the need for rate limits.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] Exercise: Bypass WAF
Let's unpack Bypass WAF together.
1,110 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exposing sensitive information
Learn examples of sensitive information exposure.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Using Lock securely
Learn how to safely use Locks in the Kotlin environment.
60 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] Exploit Tech: DBMS Misconfiguration
Learn the vulnerabilities that can be caused by DBMS misconfiguration.
969 60 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Password-related
Learn password-related vulnerabilities and how to patch them.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] ExploitTech: Error & Time based SQL Injection
Learn Error based SQL Injection and Time based SQL Injection.
1,669 60 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] ExploitTech: Blind SQL Injection Advanced
Learn the principles and methods of attacks that are more efficient than traditional Blind SQL Injection.
1,755 30 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-C] Exploit Tech: XS-Search
Learn the principles and methods of XS-Search.
609 30 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] Exercise: Blind SQL Injection Advanced
Let's walk through Blind SQL Injection Advanced together.
1,522 90 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Client-side vulnerabilities
Learn about XSS and CSRF.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] ExploitTech: DBMS Fingerprinting
Learn the principles and methods of DBMS-specific information gathering.
1,027 30 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] Exercise: CouchDB
Let's unpack NoSQL-CouchDB together.
770 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] ExploitTech: Command Injection for Linux
Learn the principles and methods of command injection in Linux.
737 60 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
CORS
Learn the correct CORS settings.
30 minutes Difficult ENTERPRISE
Exploit Tech: Return to Library
2288 finished this course.
FAT32 and NTFS File Systems
209 finished this course.
Background: Binary
8731 finished this course.
Exploit Tech: Format String Bug
1549 finished this course.
Firmware analysis
104 finished this course.
Registry
127 finished this course.
Docker
2409 finished this course.
KAPE
39 finished this course.
Object Structure - WASM, Function
77 finished this course.
Electronics/Electrical
39 finished this course.
Netcat
2726 finished this course.
[WHA-S] Exercise: Bypass WAF
1110 finished this course.
[WHA-C] Exploit Tech: XS-Search
609 finished this course.
[WHA-S] Exercise: CouchDB
770 finished this course.