Seven modules covering crypto security from first principles to regulatory compliance. Built from real incidents, real specs, and real attack data from 2024-2026.
Course Preview
Course Preview Video
Video narration arriving Q3 2026. All written module content available now.
A 30-45 second overview of what this course covers and why most crypto holders are underprotected. Available before course launch.
What this course covers
Who this is for
Individual holders
Anyone self-custodying Bitcoin, ETH, or other assets worth protecting
Fund managers and advisers
Entities navigating the 2025-2026 custody compliance requirements
This course is not for people who want theory without application. Every module ends with specific actions. If you finish it and don't change at least three things about how you store or manage keys, you weren't paying attention.
Course Modules
Module 1 is a free preview, no purchase needed. Modules 2-7 require enrollment.
How Crypto Security Actually Works
secp256k1 key pairs, BIP-39 seed phrases, HD wallet derivation paths, what the blockchain actually secures versus what it doesn't, custodial versus self-custody trade-offs, and the encryption standards (AES-256, SHA-256, ECDSA) underpinning everything.
Hardware Wallets, Model by Model
Every major hardware wallet with specific models, security chip specs, cert levels, connectivity methods, air-gap status, and honest trade-offs. Includes an interactive comparison tool to filter and compare side by side.
Hot Wallets, Browser Extensions, and dApp Interaction
MetaMask, Phantom, Rabby, Trust Wallet, and Coinbase Wallet security records and architecture. How dApp connections and token approvals work, what WalletConnect actually does, and the specific attacks that have drained funds through browser wallets.
The Real Threat Picture
Taxonomy of crypto theft: what 'hack' actually means in each case. Phishing, SIM swaps, smart contract exploits, address poisoning ($83.8M+), clipboard hijackers (ClipXDaemon), ice phishing, and North Korean Lazarus Group operations ($2.02B in 2025).
Defending Yourself
Step-by-step defense strategies you can implement today. SIM swap prevention, hardware wallet setup per brand, seed phrase storage on steel, SLIP-39 Shamir backups, password manager and 2FA hierarchy, browser hygiene, approval management via revoke.cash, and air-gapped signing for high-value transactions.
Quantum Threats, Insurance, and Long-Term Planning
Honest assessment of quantum computing timelines and what to do now. NIST post-quantum standards finalized August 2024. Crypto insurance (Evertas, Nexus Mutual, Canopius). Estate planning for crypto. Long-term multisig storage strategies.
Regulatory Framework and Custody Compliance
SEC broker-dealer custody rules (December 17, 2025), OCC Interpretive Letter 1183 (March 7, 2025), state trust company custody authority, NYDFS requirements, and what the regulatory shift means for individuals vs fund managers.
Included with enrollment
7 video lessons
AI avatar narration arriving Q3 2026 (written content available now)
Written lesson content
Full text for each module
Knowledge checks
5-8 MCQs per module with explanations
Wallet comparison tool
Filter and compare 10+ hardware wallets in Module 2
Lifetime access
Including all future updates
Stop guessing about your security posture
One purchase, seven modules, lifetime access. Use code FOUNDING40 for 40% off during the founding period.