English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 63 lectures (6h 53m) | 1.33 GB

Everything you Need to Know About Blockchains, Cryptocurrencies and Other Altcoins (Layer-1 and Layer-2 Scaling)

Blockchain is a revolutionary technology that allows for decentralized and distributed storage of information. Maybe the hottest topic at the moment in the field of software engineering – besides artificial intelligence and machine learning – is blockchain technology. Many experts in the industry predict that the blockchain will disrupt the ways we interact with technology.

In this course you will learn about the basics of blockchain technology as well as about cryptocurrencies. You can learn about the concrete implementation of these technologies in Java – although you can skip the implementation parts if you wish.

Chapter 1 – Blockchain Theory

- the fundamental basics of blockchain technology
- SHA-256 hashing technique
- centralized and decentralized ledgers
- the concept of mining (and miners)
- consensus algorithms
- proof of work (PoW) and proof of stake (PoS)
- the byzantine generals problem

Chapter 2 – Blockchain Implementation

- implementing a simple blockchain from scratch in Java

Chapter 3 – Cryptocurrency Theory

- motivation behind cryptocurrencies
- Merkle trees and transaction verification algorithms
- mining in cryptocurrencies
- mempools
- unspent transaction outputs (UTXOs)
- elliptic curve cryptography in cryptocurrencies
- what is a wallet?
- orpahned blocks and the block verification problem
- the 51% attack
- soft fork and hard fork

Chapter 4 – Cryptocurrency Implementation

- implementing a simple cryptocurrency from scratch in Java

Chapter 5 – Altcoins & Cryptocurrency Evolution

- Ethereum, Solidity and the Ether cryptocurrency
- what are ICOs?
- cardano and ADA
- altcoins
- LiteCoin (LTC)
- Dash
- layer 1 and layer-2 scaling solutions
- sharding and rollups (zk-rollups and zk-snarks)

You should take this course, if you are interested in blockchains and cryptocurrency technology. Thanks for joining my course, let’s get started!

What you’ll learn

- Understand why blockchain technology is important
- Understand proof of work (PoW) and proof of stake (PoS)
- Understand why cryptocurrencies will change the whole industry
- Understand Bitcoin, Ethereum and some of the altcoins
- Implement a simple blockchain and cryptocurrency from scratch in Java

## Table of Contents

**Introduction**

1 Introduction

**Blockchains Theory**

2 What is the motivation behind blockchains

3 Data structure behind blockchains

4 SHA256 hashing algorithm

5 SHA256 hashing algorithm example

6 Decentralized ledgers

7 Blockchain mining #1

8 Blockchain mining #2

9 Consensus protocol

10 Byzantine generals problem

11 What is proof-of-work (PoW)

12 What is proof-of-stake (PoS)

13 Decentralized and distributed networks

**Blockchain Implementation**

14 Blockchain implementation I

15 Blockchain implementation II

16 Blockchain implementation III

17 Blockchain implementation IV

18 Blockchain implementation V

19 Blockchain implementation VI

**Cryptocurrency Theory**

20 Cryptocurrency motivation

21 Cryptocurrency policies

22 Mempools

23 Mempools example

24 Merkle-tree motivation

25 Merkle-tree implementation

26 PublicKey and PrivateKey

27 UTXOs

28 Wallets

29 % attack

30 Orphaned blocks and block verification

31 Who pays the miners exactly

32 What is a fork

**Cryptocurrency Implementation**

33 Cryptocurrency implementation I

34 Cryptocurrency implementation II

35 Cryptocurrency implementation III

36 Cryptocurrency implementation IV

37 Cryptocurrency implementation V

38 Cryptocurrency implementation VI

39 Cryptocurrency implementation VII

40 Cryptocurrency implementation VIII

**Evolution of Cryptocurrencies**

41 Bitcoin

42 Altcoins and ICOs

43 Ethereum

44 Ethereum and the DAO attack

45 Layer 1 scaling – sharding

46 Layer 2 scaling – rollups

47 Polygon

48 Cardano

49 LiteCoin

50 Dash

**Appendix #1 – Elliptic Curve Cryptography (ECC)**

51 Why do we need elliptic curve cryptography

52 What are elliptic curves

53 Point addition and point doubling

54 Double and add algorithm

55 Elliptic curve discrete logarithm problem

56 Elliptic curve based Diffie-Hellman key exchange algorithm

57 Digital signatures with elliptic curves

58 RSA and elliptic curve cryptography

59 Useful article on elliptic curves

**Appendix #2 – Elliptic Curve Cryptography (ECC) Implementation**

60 Elliptic curve cryptography (ECC) implementation I

61 Elliptic curve cryptography (ECC) implementation II

62 Elliptic curve cryptography (ECC) implementation III

**COURSE MATERIALS (DOWNLOADS)**

63 Download slides and source code

Resolve the captcha to access the links!