Learn Blockchain Technology & Cryptocurrency in Java

Learn Blockchain Technology & Cryptocurrency in Java

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 63 lectures (6h 53m) | 1.33 GB

Everything you Need to Know About Blockchains, Cryptocurrencies and Other Altcoins (Layer-1 and Layer-2 Scaling)

Blockchain is a revolutionary technology that allows for decentralized and distributed storage of information. Maybe the hottest topic at the moment in the field of software engineering – besides artificial intelligence and machine learning – is blockchain technology. Many experts in the industry predict that the blockchain will disrupt the ways we interact with technology.

In this course you will learn about the basics of blockchain technology as well as about cryptocurrencies. You can learn about the concrete implementation of these technologies in Java – although you can skip the implementation parts if you wish.

Chapter 1 – Blockchain Theory

  • the fundamental basics of blockchain technology
  • SHA-256 hashing technique
  • centralized and decentralized ledgers
  • the concept of mining (and miners)
  • consensus algorithms
  • proof of work (PoW) and proof of stake (PoS)
  • the byzantine generals problem

Chapter 2 – Blockchain Implementation

  • implementing a simple blockchain from scratch in Java

Chapter 3 – Cryptocurrency Theory

  • motivation behind cryptocurrencies
  • Merkle trees and transaction verification algorithms
  • mining in cryptocurrencies
  • mempools
  • unspent transaction outputs (UTXOs)
  • elliptic curve cryptography in cryptocurrencies
  • what is a wallet?
  • orpahned blocks and the block verification problem
  • the 51% attack
  • soft fork and hard fork

Chapter 4 – Cryptocurrency Implementation

  • implementing a simple cryptocurrency from scratch in Java

Chapter 5 – Altcoins & Cryptocurrency Evolution

  • Ethereum, Solidity and the Ether cryptocurrency
  • what are ICOs?
  • cardano and ADA
  • altcoins
  • LiteCoin (LTC)
  • Dash
  • layer 1 and layer-2 scaling solutions
  • sharding and rollups (zk-rollups and zk-snarks)

You should take this course, if you are interested in blockchains and cryptocurrency technology. Thanks for joining my course, let’s get started!

What you’ll learn

  • Understand why blockchain technology is important
  • Understand proof of work (PoW) and proof of stake (PoS)
  • Understand why cryptocurrencies will change the whole industry
  • Understand Bitcoin, Ethereum and some of the altcoins
  • Implement a simple blockchain and cryptocurrency from scratch in Java
Table of Contents

Introduction
1 Introduction

Blockchains Theory
2 What is the motivation behind blockchains
3 Data structure behind blockchains
4 SHA256 hashing algorithm
5 SHA256 hashing algorithm example
6 Decentralized ledgers
7 Blockchain mining #1
8 Blockchain mining #2
9 Consensus protocol
10 Byzantine generals problem
11 What is proof-of-work (PoW)
12 What is proof-of-stake (PoS)
13 Decentralized and distributed networks

Blockchain Implementation
14 Blockchain implementation I
15 Blockchain implementation II
16 Blockchain implementation III
17 Blockchain implementation IV
18 Blockchain implementation V
19 Blockchain implementation VI

Cryptocurrency Theory
20 Cryptocurrency motivation
21 Cryptocurrency policies
22 Mempools
23 Mempools example
24 Merkle-tree motivation
25 Merkle-tree implementation
26 PublicKey and PrivateKey
27 UTXOs
28 Wallets
29 % attack
30 Orphaned blocks and block verification
31 Who pays the miners exactly
32 What is a fork

Cryptocurrency Implementation
33 Cryptocurrency implementation I
34 Cryptocurrency implementation II
35 Cryptocurrency implementation III
36 Cryptocurrency implementation IV
37 Cryptocurrency implementation V
38 Cryptocurrency implementation VI
39 Cryptocurrency implementation VII
40 Cryptocurrency implementation VIII

Evolution of Cryptocurrencies
41 Bitcoin
42 Altcoins and ICOs
43 Ethereum
44 Ethereum and the DAO attack
45 Layer 1 scaling – sharding
46 Layer 2 scaling – rollups
47 Polygon
48 Cardano
49 LiteCoin
50 Dash

Appendix #1 – Elliptic Curve Cryptography (ECC)
51 Why do we need elliptic curve cryptography
52 What are elliptic curves
53 Point addition and point doubling
54 Double and add algorithm
55 Elliptic curve discrete logarithm problem
56 Elliptic curve based Diffie-Hellman key exchange algorithm
57 Digital signatures with elliptic curves
58 RSA and elliptic curve cryptography
59 Useful article on elliptic curves

Appendix #2 – Elliptic Curve Cryptography (ECC) Implementation
60 Elliptic curve cryptography (ECC) implementation I
61 Elliptic curve cryptography (ECC) implementation II
62 Elliptic curve cryptography (ECC) implementation III

COURSE MATERIALS (DOWNLOADS)
63 Download slides and source code

Homepage