• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

DDOS demystified

DDOS demystified

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online or In-Person

  • You travel to organiser or they travel to you

  • Redhill

  • Full day

  • All levels

Description

DDOS demystified training course description

This course covers DDOS attacks and how to defend
against them. The course starts by studying DOS
attacks and then DDOS attack. Reflectors, booters and
stressers are followed by reflection and amplification.
Once the various DDOS attacks have been covered we
then study the ways to defend against DDOS attacks.

What will you learn

  • Describe DDOS.

  • Explain how DDOS attacks work.

  • Recognise DDOS attack types.

  • Describe how to defend DDOS attacks.

DDOS demystified training course details

  • Who will benefit:

Anyone involved in network security.

  • Prerequisites:

Network fundamentals

  • Duration

1 day

DDOS demystified training course contents
  • What is DOS?


Denial Of Service, outages, Attackers, Command
and control, Bots. Why DOS?

  • What is DDOS?


Distributed, reflectors, botnets, botnet topologies,
amplification, attack bandwidth, attack vectors,
booters, stressers, backscatter, DirtJumper, XOR.
RUDY. High and Low orbit Ion Cannon.

  • Attack types


Application layer attacks, HTTP flood, protocol
attacks, SYN floods, teardrop, volumetric attacks,
slowloris, DNS cachebusting, fraggle, smurf. IP
address spoofing.

  • Reflectors


Reflector attacks, amplification attacks, quotients,
embedded devices, DNS, NTP, SSDP.

  • DDOS defence


Protecting devices from becoming bots. Onsite,
outsourced scrubbing, Defending self, defending
the Internet, Black hole routing, rate limiting,
intelligent application firewalls, anycast, IPS,
upstream filtering, BCP38, BCP 140. uRPF.

About The Provider

Tags

Reviews