Cademy logoCademy Marketplace

Course Images

DDOS demystified

DDOS demystified

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online or In-Person

  • You travel to organiser or they travel to you

  • Redhill

  • Full day

  • All levels

Description

DDOS demystified training course description

This course covers DDOS attacks and how to defend against them. The course starts by studying DOS attacks and then DDOS attack. Reflectors, booters and stressers are followed by reflection and amplification. Once the various DDOS attacks have been covered we then study the ways to defend against DDOS attacks.

What will you learn
  • Describe DDOS.
  • Explain how DDOS attacks work.
  • Recognise DDOS attack types.
  • Describe how to defend DDOS attacks.
DDOS demystified training course details
  • Who will benefit:
  • Anyone involved in network security.

  • Prerequisites:
  • Network fundamentals

  • Duration
  • 1 day

DDOS demystified training course contents

  • What is DOS?
  • Denial Of Service, outages, Attackers, Command and control, Bots. Why DOS?

  • What is DDOS?
  • Distributed, reflectors, botnets, botnet topologies, amplification, attack bandwidth, attack vectors, booters, stressers, backscatter, DirtJumper, XOR. RUDY. High and Low orbit Ion Cannon.

  • Attack types
  • Application layer attacks, HTTP flood, protocol attacks, SYN floods, teardrop, volumetric attacks, slowloris, DNS cachebusting, fraggle, smurf. IP address spoofing.

  • Reflectors
  • Reflector attacks, amplification attacks, quotients, embedded devices, DNS, NTP, SSDP.

  • DDOS defence
  • Protecting devices from becoming bots. Onsite, outsourced scrubbing, Defending self, defending the Internet, Black hole routing, rate limiting, intelligent application firewalls, anycast, IPS, upstream filtering, BCP38, BCP 140. uRPF.

About The Provider

Tags

Reviews