Skip to main content

Learn Blockchain Technology & Cryptocurrency in Java

5h 44m 32s
English
Paid

Blockchain is a revolutionary technology that allows for decentralized and distributed storage of information. As one of the hottest topics in software engineering today, alongside artificial intelligence and machine learning, blockchain technology offers disruptive potential in how we interact with technology. In this course, you will explore the basics of blockchain technology and dive into the world of cryptocurrencies.

Learn the practical implementation of these technologies in Java, with the flexibility to skip the coding sections if you prefer.

Chapter 1 - Blockchain Theory

  • Understand the fundamental basics of blockchain technology

  • Learn about the SHA-256 hashing technique

  • Centralized vs decentralized ledgers

  • Explore the concept of mining and the role of miners

  • Dive into consensus algorithms

  • Proof of Work (PoW) and Proof of Stake (PoS) mechanisms

  • Resolve the Byzantine Generals Problem

Chapter 2 - Blockchain Implementation

  • Implement a simple blockchain from scratch using Java

Chapter 3 - Cryptocurrency Theory

  • Understand the motivation behind cryptocurrencies

  • Master Merkle trees and transaction verification algorithms

  • Learn about mining in cryptocurrencies

  • Explore mempools and their function

  • Uncover unspent transaction outputs (UTXOs)

  • Dive into elliptic curve cryptography in cryptocurrencies

  • What is a wallet?

  • Understand orphaned blocks and the block verification problem

  • Discover the 51% attack vulnerability

  • Differentiate between soft forks and hard forks

Chapter 4 - Cryptocurrency Implementation

  • Create a simple cryptocurrency from scratch in Java

Chapter 5 - Altcoins & Cryptocurrency Evolution

  • Dive into Ethereum, Solidity, and the Ether cryptocurrency

  • What are ICOs (Initial Coin Offerings)?

  • Explore Cardano and the ADA cryptocurrency

  • Learn about various altcoins

  • Discover LiteCoin (LTC)

  • Understand Dash and its unique features

If you're interested in blockchain and cryptocurrency technology, this course is perfect for you. Thank you for joining my course, let's get started!

About the Author: udemy

udemy thumbnail
By connecting students all over the world to the best instructors, Udemy is helping individuals reach their goals and pursue their dreams. Udemy is the leading global marketplace for teaching and learning, connecting millions of students to the skills they need to succeed. Udemy helps organizations of all kinds prepare for the ever-evolving future of work. Our curated collection of top-rated business and technical courses gives companies, governments, and nonprofits the power to develop in-house expertise and satisfy employees’ hunger for learning and development.

Watch Online 58 lessons

This is a demo lesson (10:00 remaining)

You can watch up to 10 minutes for free. Subscribe to unlock all 58 lessons in this course and access 10,000+ hours of premium content across all courses.

View Pricing
0:00
/
#1: Introduction
All Course Lessons (58)
#Lesson TitleDurationAccess
1
Introduction Demo
02:33
2
What is the motivation behind blockchains?
05:45
3
Data structure behind blockchains
06:56
4
SHA256 hashing algorithm
07:39
5
SHA256 hashing algorithm example
08:46
6
Decentralized ledgers
09:40
7
Blockchain mining #1
08:29
8
Blockchain mining #2
09:11
9
Consensus protocol
02:00
10
Byzantine generals problem
05:53
11
What is proof-of-work (PoW)?
05:05
12
What is proof-of-stake (PoS)?
08:16
13
Decentralized and distributed networks
04:28
14
Blockchain implementation I
05:46
15
Blockchain implementation II
05:41
16
Blockchain implementation III
07:36
17
Blockchain implementation IV
05:04
18
Blockchain implementation V
07:55
19
Blockchain implementation VI
06:44
20
Cryptocurrency motivation
04:11
21
Cryptocurrency policies
04:56
22
Mempools
07:08
23
Mempools example
04:18
24
Merkle-tree motivation
07:21
25
Merkle-tree implementation
06:57
26
PublicKey and PrivateKey
05:23
27
UTXOs
05:05
28
Wallets
03:14
29
51% attack
06:17
30
Orphaned blocks and block verification
05:47
31
Who pays the miners exactly?
02:22
32
What is a fork?
07:13
33
Cryptocurrency implementation I
01:40
34
Cryptocurrency implementation II
07:46
35
Cryptocurrency implementation III
01:37
36
Cryptocurrency implementation IV
04:10
37
Cryptocurrency implementation V
08:29
38
Cryptocurrency implementation VI
06:48
39
Cryptocurrency implementation VII
03:27
40
Cryptocurrency implementation VIII
03:30
41
Bitcoin
03:20
42
Altcoins and ICOs
05:31
43
Ethereum
07:04
44
Ethereum and the DAO attack
03:31
45
Cardano
11:53
46
LiteCoin
05:36
47
Dash
09:54
48
Why do we need elliptic curve cryptography?
02:50
49
What are elliptic curves?
04:20
50
Point addition and point doubling
14:03
51
Double and add algorithm
04:31
52
Elliptic curve discrete logarithm problem
03:35
53
Elliptic curve based Diffie-Hellman key exchange algorithm
05:49
54
Digital signatures with elliptic curves
10:45
55
RSA and elliptic curve cryptography
03:13
56
Elliptic curve cryptography (ECC) implementation I
08:13
57
Elliptic curve cryptography (ECC) implementation II
04:47
58
Elliptic curve cryptography (ECC) implementation III
04:31
Unlock unlimited learning

Get instant access to all 57 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.

Learn more about subscription