Course Overview
Course Description
This course delivers a rigorous, computer-science-oriented dissection of the Bitcoin protocol, built entirely around the authoritative text Mastering Bitcoin (2nd Edition) by Andreas M. Antonopoulos. Participants will progress from a high-level user perspective to a deep technical understanding of cryptography, transactions, consensus mechanisms, and network architecture. Designed for developers, engineers, and researchers, the program equips learners with a complete “full-stack” mental model of the world’s first and most secure decentralized digital currency.
Learning Outcomes
- Explain how Bitcoin solves the double-spend problem without trusted intermediaries.
- Generate and securely manage private keys, addresses, and hierarchical deterministic (HD) wallets.
- Decode, construct, and analyze raw Bitcoin transactions and Bitcoin Script.
- Describe the structure of the blockchain, Merkle trees, SPV verification, and fork resolution.
- Detail the Nakamoto Consensus algorithm, Proof-of-Work mechanics, and the role of different node types.
- Evaluate Bitcoin’s security model, common attack vectors (including 51% attacks), and best-practice defenses.
- Understand Layer 2 solutions (especially Lightning Network), soft/hard forks, and Bitcoin’s future scalability and privacy challenges.
Requirements
- Strong programming fundamentals (Python or C++ highly recommended).
- Solid grasp of data structures, computer networks, and basic cryptography (hash functions, digital signatures).
- Ability to read and understand technical documentation and pseudocode.
- Access to a computer capable of running Bitcoin Core (optional but beneficial for labs).
Features
- Six intensive weekly modules with pre-recorded technical lectures and live instructor office hours.
- Direct chapter-by-chapter walkthrough of Mastering Bitcoin (2nd Edition).
- Hands-on coding labs in Python (using libraries such as bitcoin-utils, pycoin) and raw transaction hex exercises.
- Real-node interaction: run Bitcoin Core in regtest mode, create and broadcast transactions, explore blocks.
- Weekly technical deep-dive discussions and peer code review sessions.
- Final capstone: Build and document a simple Bitcoin tool or analysis script.
Target audiences
- Software developers entering the Bitcoin and cryptocurrency space.
- Cybersecurity professionals seeking protocol-level understanding.
- Computer science students and researchers studying distributed systems and cryptography.
- Blockchain engineers preparing to build on or audit Bitcoin-related projects.
- Technical professionals transitioning from traditional finance or Web2 infrastructure.
- Anyone aiming to read and contribute to Bitcoin Core or related open-source projects.
Curriculum
- 6 Sections
- 0 Lessons
- 8 Weeks
Expand all sectionsCollapse all sections
- Module 1: Foundations & Core ConceptsPrimary Reading: Chapters 1 & 2 Key Topics: Double-spend problem, four pillars of Bitcoin, UTXO model, Cypherpunk origins, transaction lifecycle0
- Module 2: The User’s Perspective – Keys, Wallets & AddressesPrimary Reading: Chapters 4 & 5 Key Topics: Elliptic Curve Cryptography (secp256k1), private/public key derivation, BIP-32/BIP-39/BIP-44, deterministic vs. non-deterministic wallets, hot vs. cold storage Practical Labs: Generate keys and HD wallets from entropy and mnemonic seeds0
- Module 3: The Atomic Unit – TransactionsPrimary Reading: Chapter 6 Key Topics: Transaction structure (inputs, outputs, metadata), UTXO model in depth, transaction fees, Bitcoin Script, P2PKH, P2SH, SegWit, transaction malleability Practical Labs: Decode raw transactions, create and sign transactions offline, construct custom scripts0
- Module 4: The Ledger – The BlockchainPrimary Reading: Chapter 7 Key Topics: Block structure and headers, Merkle trees, chain linkage, Simplified Payment Verification (SPV), light clients, forks and orphan blocks Practical Labs: Parse blocks with Bitcoin Core, verify Merkle proofs0
- Module 5: The Network – Consensus & MiningPrimary Reading: Chapters 8 & 9 Key Topics: Nakamoto Consensus, Proof-of-Work (SHA-256, difficulty adjustment), block propagation, node types, 51% attacks and countermeasures Practical Labs: Run Bitcoin Core in regtest, mine blocks, simulate chain reorgs Module 6: Advanced Topics, Security & The Future0
- Module 6: Advanced Topics, Security & The FuturePrimary Reading: Chapters 10 & 11 + selected BIP documents Key Topics: Hard vs. soft forks, altcoins and sidechains, Layer 2 (Lightning Network overview), Bitcoin security model (CIA triad), operational security best practices, privacy and fungibility challenges Capstone Project Options: Build a custom Bitcoin wallet library or transaction tool in Python. Write a detailed security audit of a real-world Bitcoin wallet implementation. Simulate and analyze a 51% attack scenario on a regtest network.0


