2. Solidity 1. Course Roadmap
2. Introduction to Solidity Programming
3. Structure of a Solidity Program
4. Constructs and Syntax Value Types
5. Constructs and Syntax Reference Types
6. Constructs and Syntax Global Namespace
7. Constructs and Syntax Access Levels
8. Constructs and Syntax Functions
9. Constructs and Syntax Function Modifiers
10. Constructs and Syntax Events
11. High Level Compiling and Deployment Process
12. Compiler Solc
13. Compiler ABI Application Binary Interface and EVM Bytecode
14. EVM Opcodes
15. EVM Opcodes Important Examples
16. Remix IDE
17. Etherscan
18. Lab 32 Compile and Analyze EVM Code
19. Lab 32 Walkthrough
20. Deployment Fundamentals
21. Deployment Options
22. Deployment Options Metamask 1
23. Truffle
24. Truffle Basic Commands 1
25. Truffle Basic Commands 2
26. Truffle Basic Commands 3
27. Contract Interaction Overview
28. Web3
29. Calldata 1
30. Calldata 2
31. Calldata 3
32. Interact with a Contract Curl 1
33. Interact with a Contract Curl 2
34. Interact with a Contract OpenZeppelin CLI
35. Interact with a Contract Web3js via OpenZeppelin CLI
36. Lab 33 Deploy a Smart Contract
37. Lab 33 Walkthrough
3. Smart Contract Vulnerabilities 1. Course Roadmap
2. Security and Smart Contracts
3. Overview of Vulnerability Classes
4. Reentrancy Recusive Call Attacks
5. Integer OverflowUnderflow Arithmetic Attacks
6. Transaction Order Dependence
7. Denial of Service with Block Gas Limit
8. Unprotected Selfdestruct
9. Timestamp Manipulation
10. Delegatecall
11. Inforgraphic of Vulnerability Classes and Causes
12. Inforgraphic of Vulnerability Attacks and Consequences
13. The DAO Hack
14. The Parity Bug
15. Types of Tools
16. Mythril MythX
17. Slither
18. Manticore
19. Echidna
20. Solgraph
21. IDAEVM in Development
22. ZIION
23. Honorable Mentions
24. Published Research on Smart Contract Security Scanning
25. Lab 34 Scan a Smart Contract for Vulnerabilities
26. Lab 34 Walkthrough
4. Attacking and Exploiting Smart Contracts 1. Course Roadmap
2. Exploiting Ehereum Smart Contracts 1
3. The DAO Hack Case Study 1
4. The DAO Hack Case Study 2
5. The DAO Hack Case Study 3
6. The DAO Hack Case Study 4
7. The DAO Hack Case Study 5
8. The DAO Hack Case Study 6
9. The DAO Hack Case Study 7
10. The DAO Hack Case Study 8
11. The DAO Hack Case Study 9
12. The DAO Hack Case Study 10
13. The DAO Hack Case Study 11
14. The DAO Hack Case Study 12
15. The DAO Hack Case Study 13
16. The DAO Hack Case Study 14
17. The DAO Hack Case Study 15
18. The DAO Hack Case Study 16
19. The DAO Hack Case Study 17
20. The DAO Hack Case Study 18
21. Preventing the Exploit
22. Exploiting Ehereum Smart Contracts 2
23. Lab 35 Identifying a Smart Contract Exploit
24. Lab 35 Walkthrough
25. Security Exploitation Tools teEther
26. Security Exploitation Tools Scrooge McEtherface
27. Security Exploitation Tools Karl
28. Another Parity Wallet Bug Case Study 1
29. Another Parity Wallet Bug Case Study 2
30. Another Parity Wallet Bug Case Study 3
31. Another Parity Wallet Bug Case Study 4
32. Lab 36 Exploit a Smart Contract
33. Lab 36 Walkthrough