Blockchain Security Services

Security Training

“Before embarking on a distributed-ledger project, ensure your team has the cryptographic skills to understand what is and isn’t possible.”Gartner, Top 10 Strategic Technology Trends for 2018

How can I upskill my security workforce to be at the forefront of blockchain adoption?

A lack of available developers is already being felt by enterprises keen to be at the forefront of blockchain adoption. This skills gap will only become more pronounced as blockchain technology becomes mainstream.

Solution

Since there is currently insufficient talent to meet the blockchain needs of enterprise clients, there is only one obvious solution — upskilling existing developers. Our Blockchain Security Center is home to some the world’s leading blockchain and cryptography trainers, who can provide your developers with the tools and insight they need to start developing blockchain solutions.

Course options include:

Blockchain Theory and Practice

Designed as an introduction to blockchain technologies, this course covers fundamental concepts such as basic cryptography, cryptocurrencies, smart contracts, and decentralized applications. Beyond this, attendees will learn about common security flaws in blockchain solutions, secure development practices, and how to create crypto tokens.

Crypto Attacks and Defenses

This course covers all of the essential components of modern cryptography, including ciphers, hash functions, formal security notions and attack models, elliptic-curve cryptography, and more. Crucially, the course also covers cryptography applications for blockchain solutions.

Why Us

Enterprise blockchain development is challenging and requires a high degree of expertise. Our Blockchain Security Center is home to some of the world’s foremost cryptography experts, who have significant experience in both the execution and teaching of crypto and blockchain concepts.

To find out more about our services, or to arrange a consultation, contact us today.

Blog

  • Google, IBM, and the Quantum Supremacy Affair Explained
    by Tommaso Gagliardoni on November 20, 2019 at 4:05 pm

    You have probably heard about some big announcement by Google on the topic of “quantum supremacy”, and maybe also about a rebuttal by IBM criticizing […]

  • Audit of Binance TSS-lib
    by Tommaso Gagliardoni on November 6, 2019 at 2:06 pm

    Binance created an open source software library available on Github implementing a threshold ECDSA signature scheme (TSS), and hired Kudelski Security to perform a security […]

  • Audit of KZen’s Multi-party ECDSA
    by Nathan Hamiel on November 4, 2019 at 3:36 pm

    KZen hired Kudelski Security to perform a security assessment of their Multi-party ECDSA library and provided us access to their source code and associated documentation. […]

  • Navigating Your First Month as a New CISO
    by John Hellickson on November 4, 2019 at 2:49 pm

    The single most important thing you can do is to start building the relationships and political capital you’ll need to run your security program. Here’s how. In any new job, it’s important to assess the lay of the land. But when you start a new CISO role — whether it’s your first or fifth — […]

  • The Office 365 Avenue of Approach
    by Mark Mattei on October 22, 2019 at 1:00 pm

    Threat actors, advanced persistent threats, and simple cybercriminals are always looking for the latest way to get in or take advantage of potential victims. An avenue of approach is defined as a route of an attacking force leading to its objective. The latest and easiest avenue of approach is Office 365. Since this capability is […]

In the Press

Let's Talk