Lesson Library
Browse all 189 lessons freely. No prerequisites required.
Ethereum: The World Computer
From Vitalik's vision to programmable money
Introduction to Blockchain
Understand what a blockchain is and why it matters
How to Create a Crypto Wallet (Beginner Walkthrough)
Learn how to set up your first crypto wallet step-by-step, save your recovery phrase safely, and understand what your wallet address is.
Common Smart Contract Exploits
Reentrancy, flash loan attacks, and oracle manipulation
Public and Private Keys
How cryptographic key pairs secure your crypto
The Blockchain Trilemma
Security, scalability, and decentralization trade-offs
What is a DAO?
Decentralized Autonomous Organizations explained
Proof of Work (PoW)
How Bitcoin achieves consensus through mining
What are NFTs?
Non-fungible tokens and digital ownership explained
What is DeFi?
Decentralized finance and why it matters
Bitcoin: Origin and History
From Satoshi's whitepaper to digital gold
Types of Crypto Wallets
Hot wallets, cold wallets, and everything in between
How to Buy Crypto (On-Ramping)
Learn how to convert fiat money into cryptocurrency using a centralized exchange — from account setup to completing your first purchase.
Atomic Swaps
Learn atomic swap mechanics.
Smart Contracts Explained
Code that executes itself — trustlessly
Token Pairs
Understand token pairs.
Bitcoin Economics: Supply and Halving
Understanding Bitcoin's deflationary monetary policy
Staying Safe in Crypto
Common scams, phishing, and how to protect yourself
Mint Functions
Identify risky mint functions.
Automated Market Makers (AMMs)
How DEXs work without order books
Gas Basics
Understand gas costs.
Proof of Stake (PoS)
How Ethereum and modern blockchains achieve consensus
The NFT Ecosystem
Marketplaces, collections, and royalties
Rug Pulls
Avoid rug pulls.
Digital Signatures Explained
How transactions are authenticated on-chain
The Layer 2 Ecosystem
Arbitrum, Optimism, zkSync, and Base compared
Contract Verification
Check verification status.
Operational Security for Crypto
Advanced OPSEC practices for protecting your assets
What is Slippage?
Understand slippage in DEX trading.
Liquidity Locks
Verify liquidity locks.
Market Orders
Understand market order mechanics.
What is a DEX?
Understand DEX basics.
Supply Metrics
Understand supply metrics.
Candlestick Basics
Master candlestick interpretation.
Distributed Ledger Technology
How DLT differs from traditional databases
Bid-Ask Spreads
Understand bid-ask spreads.
Regulatory Overview: Global Crypto Landscape
Understand the global regulatory environment for cryptocurrencies and blockchain technology.
Diversification
Master portfolio diversification.
How DAO Voting Works
DAO voting is the process by which members of a Decentralized Autonomous Organization make collective decisions on proposals, typically using their holdings of the DAO's native token to cast votes.
Gas Pricing
Monitor gas prices.
Blocks, Chains, and Hashes
The technical structure of a blockchain
Limit Orders
Master limit order placement.
Pool Liquidity
Evaluate pool liquidity.
Position Sizing
Learn proper position sizing.
Gas, Fees, and EIP-1559
How Ethereum transaction fees work
DEX Routing
Understand multi-hop routing.
How to Use a DEX (Simple Walkthrough)
Learn how to connect your wallet to a DEX, select tokens to swap, review trade details, and complete your first decentralized exchange transaction.
Other Consensus Mechanisms
DPoS, PoH, PoA, and beyond
Burn Mechanisms
Evaluate burns.
CLTV Act: Comprehensive Overview
Deep dive into the Crypto-Asset Liability and Tax Verification (CLTV) Act and its implications.
Contract Ownership
Evaluate ownership structures.
Volume Analysis
Interpret volume correctly.
DeFi Lending and Borrowing
Aave, Compound, and collateralized loans
Cryptographic Hash Functions
The mathematical backbone of blockchain security
Honeypots
Detect honeypots.
Lock Duration
Monitor lock expiration.
Price Impact
Calculate price impact.
AMM Mechanics
Learn how AMMs work.
How Bitcoin Transactions Work
UTXOs, fees, and the mempool explained
Code Review
Review contract code.
Support and Resistance
Identify support/resistance levels.
Volatility Indicators
Use volatility indicators.
Slippage Explained
Minimize slippage in trades.
Audit Badges
Evaluate audits.
Nodes and Network Architecture
How blockchain networks are structured
Trend Analysis
Recognize and trade with trends.
Phishing Scams
Protect from phishing.
GENIUS Act: Framework and Differences
Explore the GENIUS Act as an alternative regulatory approach and how it differs from CLTV.
Optimistic Rollups Deep Dive
Optimistic Rollups are a Layer 2 scaling solution that assumes transactions are valid unless proven otherwise, improving blockchain scalability.
Custodial vs Non-Custodial Wallets
This lesson explains the fundamental differences between custodial and non-custodial cryptocurrency wallets, highlighting who controls the private keys in each type.
How NFT Metadata Works
This lesson explains what NFT metadata is, how it functions, and why it's crucial for defining an NFT's characteristics and digital identity.
Token-Based vs Reputation-Based Governance
DAO governance models primarily fall into two categories: **token-based governance**, where voting power is directly tied to the amount of governance tokens a member holds, and **reputation-based governance**, where voting power is earned through active participation, contributions, and demonstrated expertise within the DAO, rather than token ownership.
Liquidity Pools
Understand liquidity pools.
Minimizing Slippage
Reduce slippage costs.
Supply Mechanics
Analyze token supply.
Vesting Schedules
Analyze vesting.
How to Send and Receive Crypto
Learn how to safely send and receive cryptocurrency — including address verification, network selection, and why test transactions are essential.
Price Calculation
Master AMM math.
Stop Loss and Take Profit
Use stop loss and take profit effectively.
Gas Optimization
Reduce transaction costs.
Phishing Attacks in Crypto
This lesson defines phishing attacks in crypto, explains their importance due to potential asset loss, provides an example of a fake exchange email, lists common mistakes like clicking suspicious links, and offers a safety tip to always verify URLs and enable 2FA.
Inflation and Deflation
Analyze inflation.
LP Economics
Understand LP risks.
How to Verify a Transaction (TX Hash)
Learn how to find and read a transaction hash (TXID) on a blockchain explorer to confirm any crypto transaction was sent and received successfully.
DAO Treasury Management
DAO treasury management refers to the strategic oversight and allocation of a Decentralized Autonomous Organization's collective funds, typically held in a smart contract.
Staking and Compliance Obligations
Understand how staking fits into the regulatory framework and what compliance means for stakers.
Symmetric vs Asymmetric Encryption
This lesson explains the fundamental differences between symmetric and asymmetric encryption, highlighting their respective uses and importance in securing digital communications.
Liquidity Pools Explained
Liquidity pools are collections of funds locked in a smart contract, enabling decentralized trading, lending, and other financial activities without traditional intermediaries.
Tokenomics Analysis
Evaluate tokenomics.
NFT Royalties and Creator Economics
This lesson covers NFT royalties, explaining how they provide creators with ongoing income from secondary sales and their impact on the digital creator economy.
Delegated Proof of Stake (DPoS)
Delegated Proof of Stake (DPoS) is a consensus mechanism where token holders vote for a set of delegates or "witnesses" to validate transactions and create new blocks.
Rug Pulls and Exit Scams
This lesson defines rug pulls and exit scams as malicious schemes where project creators abandon a project with investor funds, explains their importance due to significant financial losses, provides a DeFi example, lists common mistakes like investing in anonymous projects, and offers a safety tip to conduct thorough due diligence.
Bitcoin Mining Explained
This lesson explains the fundamental process of Bitcoin mining, its role in network security, and how new bitcoins are created.
ZK-Rollups Deep Dive
ZK-Rollups are a Layer 2 scaling solution that uses Zero-Knowledge Proofs to cryptographically verify off-chain transactions on the main blockchain.
Security Tools
Use security scanning.
Seed Phrases and Recovery
This lesson details what a seed phrase is, its critical role in cryptocurrency wallet recovery, and best practices for its secure management.
Pump and Dumps
Recognize pump and dumps.
Gas Fees Explained
This lesson explains what gas fees are on the Ethereum network, why they are important, and provides examples and safety tips for managing them.
Rollup Architecture Explained
Rollup architecture describes the design of Layer 2 solutions that process transactions off-chain and then post a summary to the main blockchain for security.
The Halving: What It Is and Why It Matters
This lesson delves into the Bitcoin halving event, its impact on supply scarcity, and its historical significance for Bitcoin's value.
Famous DAOs: MakerDAO, Uniswap, Compound
Famous DAOs like MakerDAO, Uniswap, and Compound are prominent examples of Decentralized Autonomous Organizations that have successfully implemented decentralized governance to manage significant blockchain protocols and financial services.
How Blocks Are Linked Together
In a blockchain, "blocks" are digital containers of transaction data, and they are cryptographically linked together in a continuous, chronological chain using unique identifiers called hashes.
DeFi and Regulatory Challenges
Explore the unique regulatory challenges posed by decentralized finance protocols.
The EVM: Ethereum Virtual Machine
This lesson introduces the Ethereum Virtual Machine (EVM), explaining its role in executing smart contracts and transactions on the Ethereum blockchain.
How to Cash Out Crypto (Off-Ramping)
Learn how to convert cryptocurrency back to fiat currency and withdraw it to your bank account — the complete off-ramp process.
Hardware Wallets: Cold Storage
This lesson introduces hardware wallets as a secure method for storing cryptocurrency offline, explaining their function as cold storage.
Impermanent Loss
Impermanent loss occurs when the price of your deposited assets in a liquidity pool changes compared to when you deposited them, resulting in a temporary unrealized loss when measured against simply holding the assets outside the pool.
NFT Marketplaces Compared
This lesson compares various NFT marketplaces, highlighting their differences in features, fees, and supported blockchains to help users choose the right platform.
Smart Contract Vulnerabilities
This lesson defines smart contract vulnerabilities as flaws in code exploitable by malicious actors, explains their importance due to irreversible consequences, provides The DAO hack as an example, lists common mistakes like lack of testing, and offers a safety tip to ensure rigorous security audits.
Proof of Authority (PoA)
Proof of Authority (PoA) is a consensus mechanism that grants a small, pre-approved set of validators the right to create new blocks and validate transactions.
Hot Wallets vs Cold Wallets
This lesson differentiates between hot and cold cryptocurrency wallets, emphasizing their respective security implications and ideal use cases.
Merkle Trees: How Blockchains Verify Data
This lesson explores Merkle trees, explaining their structure and crucial function in enabling efficient and secure data verification within blockchain networks.
ZK Proofs Simplified
Zero-Knowledge Proofs allow one party to prove a statement is true to another, without revealing any information about the statement itself.
DAO Legal Structures
DAO legal structures refer to the various legal frameworks and entities that Decentralized Autonomous Organizations can adopt to gain legal recognition, manage liabilities, and interact with traditional legal systems.
Public vs Private Blockchains
Blockchains can be broadly categorized into public and private types.
Proof of History (PoH) — Solana
Proof of History (PoH) is a unique consensus mechanism used by the Solana blockchain that creates a historical record of events, proving that a transaction occurred at a specific moment in time.
KYC and AML: Compliance Requirements
Understand Know Your Customer and Anti-Money Laundering requirements in crypto.
Minting an NFT: The Process
This lesson details the process of minting an NFT, explaining how digital files are transformed into unique, verifiable, and tradable blockchain assets.
Solidity Basics: Writing Smart Contracts
This lesson covers the basics of Solidity, the programming language used to write smart contracts on Ethereum, and provides an example of a simple token contract.
OPSEC for Crypto Users
This lesson defines OPSEC for crypto users as protecting sensitive information to prevent attacks, explains its importance for minimizing digital footprint, provides examples like using dedicated devices, lists common mistakes like reusing passwords, and offers a safety tip to practice a "need-to-know" basis for crypto activities.
Yield Farming and Liquidity Mining
Yield farming is a strategy where cryptocurrency holders leverage various DeFi protocols to maximize returns on their crypto assets, often by providing liquidity or staking tokens. Liquidity mining is a specific type of yield farming where users are rewarded with additional tokens (often the protocol's governance token) for providing liquidity to a protocol.
Bitcoin Script: Simple Smart Contracts
This lesson introduces Bitcoin Script, explaining its role in enabling basic conditional logic and advanced transaction types on the Bitcoin blockchain.
Common Beginner Mistakes (And How to Avoid Them)
The most common and costly mistakes new crypto users make — and exactly how to avoid each one. This lesson could save your funds.
Zero-Knowledge Proofs Simplified
This lesson simplifies zero-knowledge proofs, explaining how they allow one party to prove a statement\'s truth to another without revealing any additional information.
Layer-0 Protocols
Layer-0 protocols are the foundational infrastructure that enables the creation and interoperability of various Layer-1 blockchain networks.
Lightning Network: Layer 2 for Bitcoin
This lesson explores the Lightning Network, a Layer 2 solution designed to provide fast, low-cost, and scalable Bitcoin transactions.
Token Standards: ERC-20, ERC-721, ERC-1155
This lesson differentiates between key Ethereum token standards like ERC-20 for fungible tokens, ERC-721 for unique NFTs, and ERC-1155 for multi-token management.
Multi-Signature Wallets
This lesson explains multi-signature (multisig) wallets, detailing how they enhance security by requiring multiple private key signatures for transactions.
Crypto Tax Basics
This lesson defines crypto tax basics as rules for reporting crypto gains and losses, explains their importance for compliance, provides an example of taxable capital gains, lists common mistakes like not keeping records, and offers a safety tip to consult a tax professional.
Governance Attacks and Vulnerabilities
Governance attacks and vulnerabilities refer to malicious attempts or inherent weaknesses within a DAO's governance system that can be exploited to manipulate voting outcomes, misappropriate funds, or disrupt the protocol's operations.
Stablecoins: Mechanisms and Risks
Stablecoins are cryptocurrencies designed to minimize price volatility, typically by pegging their value to a stable asset like the U.S. dollar, a basket of fiat currencies, or commodities.
Tax Reporting and Crypto Transactions
Learn about tax obligations and reporting requirements for crypto transactions.
Blockchain Explorers: Reading the Chain
A blockchain explorer is a web-based tool that allows users to view and analyze all transactions, blocks, addresses, and other on-chain data that has occurred on a specific blockchain network.
Byzantine Fault Tolerance
Byzantine Fault Tolerance (BFT) is a property of a distributed system that allows it to reach consensus even if some of its components (nodes or actors) fail or act maliciously.
NFT Scams and How to Avoid Them
This lesson identifies common NFT scams and provides essential safety tips to help users protect their digital assets and avoid financial losses.
Finality: Probabilistic vs Deterministic
Finality refers to the assurance that once a transaction is recorded on a blockchain, it cannot be changed, reversed, or canceled.
Bitcoin UTXOs Explained
This lesson clarifies the concept of Unspent Transaction Outputs (UTXOs) and their fundamental role in Bitcoin's accounting model and transaction validation.
Immutability Explained
In the context of blockchain, immutability refers to the inability to alter, delete, or tamper with data once it has been recorded on the blockchain.
Slippage Explained
Slippage refers to the difference between the expected price of a trade and the price at which the trade is actually executed, often occurring in volatile markets or when trading illiquid assets.
Soulbound Tokens (SBTs)
This lesson introduces Soulbound Tokens (SBTs), explaining their non-transferable nature and their potential to revolutionize digital identity and verifiable credentials.
Building Compliance Infrastructure
Understand the infrastructure and tools needed for regulatory compliance in crypto.
Hash Collisions and Security
This lesson defines hash collisions, explains their security implications, and emphasizes the importance of using strong cryptographic hash functions to prevent vulnerabilities.
Token Approvals and Permissions
This lesson covers token approvals in smart contracts, explaining their function, importance, and associated security risks in decentralized applications.
Governance Voting Systems
Governance voting systems are the specific mechanisms and rules employed by DAOs to allow members to cast votes on proposals, aggregate those votes, and determine the outcome.
Advanced Tokenomics Structures
This lesson defines advanced tokenomics as sophisticated token economic models, explains their importance for project sustainability, provides an example of token burns, lists common mistakes like insufficient utility, and offers a safety tip to research tokenomics thoroughly.
Ethereum Upgrades: The Merge and Beyond
This lesson explains Ethereum's network upgrades, focusing on The Merge's transition to Proof-of-Stake and future improvements for scalability and efficiency.
Cross-Chain Interoperability Models
Cross-chain interoperability allows different blockchain networks to communicate, exchange data, and transfer assets seamlessly and securely.
State Channels and Payment Channels
State Channels allow off-chain transactions between participants, with only the opening and closing recorded on the main blockchain, improving scalability.
Flash Loans
Flash loans are a type of uncollateralized loan in decentralized finance (DeFi) that must be borrowed and repaid within the same blockchain transaction, leveraging smart contract automation.
Taproot and Bitcoin Upgrades
This lesson covers the Taproot upgrade, detailing how it enhances Bitcoin's privacy, efficiency, and smart contract capabilities.
Validator Slashing and Penalties
Validator slashing is a punitive mechanism in Proof of Stake (PoS) blockchains designed to deter malicious behavior or negligence by validators.
Protocol Incentive Design
Protocol incentive design refers to the strategic creation of economic and social mechanisms within a decentralized protocol or DAO to encourage desired behaviors and discourage undesirable ones among participants.
Token Launch Mechanics
This lesson defines token launch mechanics as methods for introducing new tokens to the market, explains their importance for project success, provides an example of an ICO, lists common mistakes like not understanding vesting schedules, and offers a safety tip to prioritize transparent projects.
MEV: Maximal Extractable Value
This lesson defines Maximal Extractable Value (MEV), its impact on blockchain transactions, and strategies to mitigate its effects.
Public Key Infrastructure (PKI)
This lesson explains Public Key Infrastructure (PKI), its components, and its vital role in establishing trust and securing digital communications and identities online.
NFTs Beyond Art: Real-World Use Cases
This lesson explores the diverse real-world applications of NFTs beyond digital art, including their use in property, ticketing, and supply chain management.
Institutional Adoption and Compliance
How compliance frameworks enable institutional participation in crypto markets.
Wallet Security Best Practices
This lesson outlines essential wallet security best practices, emphasizing the importance of vigilance and technical measures to protect cryptocurrency assets.
The Double-Spend Problem
The double-spend problem is a fundamental challenge in digital currency where a single unit of currency could potentially be spent more than once by its owner.
Participating in a DAO
Participating in a DAO involves engaging with a Decentralized Autonomous Organization's governance processes, contributing to its community, and helping to shape its future direction.
Cryptographic Randomness
This lesson delves into cryptographic randomness, explaining its definition, critical importance for security, and common pitfalls to avoid in its generation and use.
Future Regulatory Trends and Outlook
Explore emerging regulatory trends and the future of crypto regulation.
Nodes and Network Participants
In a blockchain network, **nodes** are computers that run the blockchain software, store a copy of the ledger, and participate in validating and relaying transactions.
Crypto Game Theory
This lesson defines crypto game theory as applying strategic interaction models to blockchain incentives, explains its importance for network security, provides a Proof-of-Stake example, lists common mistakes like underestimating human behavior, and offers a safety tip to examine game theory design for stability.
Recovering a Lost Wallet
This lesson explains the process of recovering a lost cryptocurrency wallet, focusing on the crucial role of the seed phrase in regaining access to funds.
Liquidation Mechanics
In decentralized finance (DeFi) lending protocols, liquidation mechanics refer to the automated process by which a borrower's collateral is sold to repay their loan if the value of their collateral falls below a certain threshold, known as the liquidation price.
NFT Valuation: What Makes One Worth Something?
This lesson delves into NFT valuation, explaining the various factors like scarcity, utility, and community that determine an NFT's worth in a dynamic market.
Consensus and Energy Consumption
Consensus mechanisms are fundamental to blockchain operation, enabling distributed networks to agree on the state of the ledger.
Data Availability and Danksharding
Data Availability ensures all transaction data is accessible for verification, and Danksharding is an Ethereum upgrade to increase this capacity for rollups.
Oracles: Connecting Blockchain to the Real World
This lesson explains what oracles are and how they connect smart contracts to external real-world data, enabling more dynamic and useful decentralized applications.
Bitcoin vs Gold: Digital Scarcity
This lesson compares Bitcoin to gold, highlighting their similarities as stores of value and Bitcoin's unique advantages as a digitally scarce asset.
The Modular Blockchain Thesis
The Modular Blockchain Thesis proposes separating core blockchain functions into specialized, interconnected layers for greater scalability and efficiency.
Watch-Only Wallets and Portfolio Tracking
This lesson defines watch-only wallets and portfolio tracking, explaining their utility for monitoring cryptocurrency holdings without compromising private keys.
Running a Bitcoin Node
This lesson explains the importance of running a Bitcoin node for network decentralization, security, and independent transaction verification.
The Environmental Impact of NFTs
This lesson examines the environmental impact of NFTs, focusing on energy consumption of blockchain networks and the shift towards more sustainable solutions.
The Future of DAOs
The future of DAOs refers to the evolving landscape and potential developments of Decentralized Autonomous Organizations, including their increasing adoption across various sectors, advancements in governance mechanisms, and their growing impact on traditional organizational structures and global coordination.
Smart Contract Audits and Security
This lesson emphasizes the importance of smart contract audits for identifying vulnerabilities and ensuring the security and reliability of decentralized applications.
The CAP Theorem in Blockchain
The CAP Theorem states that a distributed data store can only simultaneously guarantee two out of three properties: **Consistency**, **Availability**, and **Partition Tolerance**.
DeFi Risk Management
DeFi risk management involves identifying, assessing, and mitigating the various risks associated with participating in decentralized finance protocols, aiming to protect assets and optimize returns.
Forks: Hard and Soft
In blockchain, a **fork** occurs when a blockchain splits into two potential paths, typically due to changes in the network's rules or software.
Global Regulatory Landscape
This lesson defines the global regulatory landscape for crypto as evolving laws governing digital assets, explains its importance for compliance and market navigation, provides examples of varying national approaches, lists common mistakes like assuming uniform regulations, and offers a safety tip to stay informed and seek legal advice.
Quantum Computing and Crypto
This lesson examines the emerging threat of quantum computing to current cryptographic algorithms and discusses the importance of developing quantum-resistant solutions.
Token Approvals in DeFi
Token approvals in DeFi grant a smart contract permission to spend a specific amount of your tokens on your behalf, typically required before interacting with decentralized applications (dApps) like exchanges or lending platforms.
Real-World Blockchain Use Cases
Real-world blockchain use cases refer to the practical applications of blockchain technology beyond cryptocurrencies, leveraging its core properties like decentralization, immutability, and transparency to solve problems across various industries.
Bitcoin Mempool and Transaction Fees
This lesson describes the Bitcoin mempool, its function as a waiting area for transactions, and how transaction fees are determined by network congestion.
Crypto Scams Targeting Wallets
This lesson identifies common cryptocurrency scams that target wallets, explaining their mechanisms and the importance of user vigilance to prevent asset theft.
Layer 2 Rollups on Ethereum
This lesson explains Layer 2 rollups as scaling solutions for Ethereum, detailing how they increase transaction throughput and reduce fees by processing transactions off-chain.
Neobanks and Deobanks: The Future of Banking
How digital-native and decentralized banks are disrupting traditional finance
Real World Assets (RWAs): Tokenizing the Physical World
How tokenized real estate, bonds, commodities, and treasuries are bridging TradFi and DeFi
