Build real skills in cold storage security

You'll learn how to secure digital assets using hardware wallets, air-gapped systems, and multi-signature setups. These workshops focus on practical application rather than theory, preparing you for situations where mistakes cost real money.

Cold storage workshop environment with hardware security devices

How material delivery works

Learning happens through direct application. You work with actual hardware wallets, configure real security protocols, and troubleshoot problems that mirror what happens in production environments. Each module builds on what you've practiced before, moving from basic key generation to complex recovery scenarios. The balance between explanation and hands-on work shifts based on complexity: foundational concepts get more demonstration time, while advanced configurations require more independent problem-solving.

Guided practice sessions

You receive step-by-step instructions for configuring hardware wallets, generating seed phrases, and testing recovery procedures. Each session includes checkpoint validations where you verify your setup matches security requirements before moving forward.

  • Hardware wallet initialization with entropy verification
  • Private key derivation and BIP39 seed phrase creation
  • Recovery simulation with intentional device failure
  • Multi-device backup validation procedures

Independent configuration work

After guided sessions, you tackle more complex scenarios on your own: setting up multi-signature wallets, configuring time-locked transactions, or implementing threshold signature schemes. You have access to reference documentation and troubleshooting guides, but solutions require your own analysis.

  • 2-of-3 multisig wallet setup across different hardware vendors
  • Air-gapped transaction signing workflows
  • Hardware wallet firmware verification and update procedures
  • PSBT construction and coordination between signing devices

Try before committing

Sample module access

Get immediate access to our hardware wallet basics module. You'll configure a test wallet, generate a recovery phrase, and simulate a device replacement scenario. This gives you direct experience with our instruction format, pacing, and the actual tools you'll use throughout the program. No credit card needed, no time limit on this specific module.

Start sample module
Hardware wallet configuration interface and setup tools

Full curriculum preview

Browse the complete learning path without restriction. You can review every module description, see required equipment lists, check prerequisite knowledge, and read actual assignment briefs. This transparency lets you assess whether the technical depth matches your current skill level and learning goals before purchasing access.

View curriculum
Overview of security workshop curriculum and module structure

Track your progress through skill stages

Foundation setup

Complete basic hardware wallet configuration, seed phrase generation, and single-signature transaction workflows.

Security hardening

Implement passphrase protection, verify firmware signatures, set up decoy wallets, and practice secure backup procedures.

Advanced configurations

Build multi-signature setups, coordinate PSBT workflows, configure time-locked transactions, and implement threshold schemes.

Recovery mastery

Execute complete wallet recovery scenarios, troubleshoot derivation path issues, restore from damaged seeds, and validate inheritance procedures.

Extended support options

Standard workshop access includes all core modules, assignment materials, and community forum support. Some learners need more direct guidance, especially when working with institutional security requirements or unique custody architectures.

Premium access adds scheduled consultation sessions with our security engineers, priority response on technical questions, and access to advanced scenario workshops that cover edge cases not included in standard curriculum.

Direct expert consultation

Book 60-minute sessions to review your specific security architecture, troubleshoot complex configurations, or discuss custody solutions for organizational needs.

Priority technical support

Get responses within 4 hours for setup questions, firmware issues, or recovery procedure clarifications instead of standard 24-48 hour forum response times.

Advanced scenario access

Work through complex situations like cross-border inheritance planning, multi-entity custody coordination, and disaster recovery for geographically distributed key holders.

Custom assignment review

Submit your own security setup for detailed analysis and recommendations, including threat modeling feedback and configuration optimization suggestions.

Workshop participant profile
Oskar Lindström

Completed advanced modules

The recovery module saved me from a real problem three months after finishing. I had a hardware wallet firmware corruption and needed to restore from seed. Following the exact procedures we practiced meant I recovered everything without panic or mistakes.

Advanced workshop participant
Dmitri Volkov

Premium tier member

Premium consultation helped me design a 3-of-5 multisig structure for our company treasury. The engineer walked through our specific threat model and pointed out security gaps I hadn't considered in my initial design.