Lesson 1Token supply mechanics: issuance schedules, inflation, halving, minting, burning, capped vs. uncapped supplyThis part looks closely at how token supply works, covering issuance, inflation, halvings, minting, and burning. Learners will compare limited and unlimited supplies, model thinning out, and check how supply rules impact price and motivations.
Genesis allocations and vesting schedulesBlock rewards, emissions, and tail inflationHalving events and supply shock narrativesMinting, burning, and fee-burn mechanismsDilution, float, and fully diluted valuationLesson 2Reading and extracting key information from whitepapers and protocol specificationsThis part teaches learners to read whitepapers and protocol details carefully. It covers the layout, main economic and technical points, token sharing, management, and spotting warning signs, missing info, and promises that seem too good to be true.
Typical whitepaper structure and sectionsIdentifying core problem, scope, and audienceConsensus, security, and threat assumptionsToken distribution, unlocks, and incentivesRed flags, omissions, and unverifiable claimsLesson 3Staking, delegation, and validator economics: rewards, slashing, lock-ups, and effects on circulating supplyThis part explains staking, delegation, and validator money matters in proof-of-stake setups. It covers reward setups, penalties, lock-ups, liquid staking, and how these affect safety, ease of use, and tokens in circulation.
Validator roles, hardware, and responsibilitiesReward schedules, APR, and real yieldSlashing conditions and risk managementDelegation models and staking poolsLiquid staking tokens and rehypothecationLesson 4How tokens capture economic value: utility, governance, payment, and commodity-like characteristicsThis part studies how various token types grab and share economic worth. It separates utility, governance, payment, and commodity-style tokens, and looks at fee movements, value building, and rules implications for each type.
Utility tokens and access-rights designGovernance tokens and voting powerPayment tokens and medium-of-exchange rolesCommodity-like and asset-backed token traitsValue accrual, buybacks, and fee-sharing modelsLesson 5On-chain activity metrics and interpretation: active addresses, transaction counts, fees, throughput, and gas dynamicsThis part shows how to understand on-chain activity measures like active addresses, transactions, fees, and gas. Learners link basic numbers to user actions, network well-being, blockages, and long-term money health of systems.
Active addresses, users, and sybil concernsTransaction counts, throughput, and batchingGas, base fees, and priority fees explainedMEV, reorgs, and fee market dynamicsInterpreting dashboards and avoiding misreadsLesson 6Overview of blockchain architectures and consensus mechanisms (PoW, PoS, hybrid, layer-2 solutions)This part brings in main blockchain setups and agreement methods. It compares PoW, PoS, mixed designs, and layer-2 scaling, focusing on safety, spread out control, speed, and choices in real networks.
Monolithic vs modular blockchain designsProof-of-Work security and incentivesProof-of-Stake variants and finality modelsHybrid and committee-based consensusLayer-2 rollups, channels, and data availabilityLesson 7Stablecoins, wrapped tokens, and cross-chain bridges: mechanics, use cases, and systemic implicationsThis part makes clear how stablecoins, wrapped tokens, and cross-chain bridges function. It covers design types, backing, bridge safety dangers, and overall effects on ease of use, borrowing, and spread of issues across blockchain worlds.
Fiat- and crypto-collateralized stablecoin modelsAlgorithmic and hybrid stablecoin stabilizationWrapped assets and synthetic token designBridge architectures and security assumptionsSystemic risks, depegs, and contagion channelsLesson 8Network effects and adoption curves: protocols, applications, and developer ecosystemsThis part looks into how network effects push protocol and app take-up. It covers user and builder growth, take-up paths, build-together features, and how systems compete, work together, and hold strong points over time.
Direct and indirect network effects in protocolsAdoption curves and S-curve modelingDeveloper ecosystems and tooling flywheelsComposability, liquidity pools, and moatsMultichain competition and winner-take-most