Ethical Hacking: Denial of Service
Offered By: LinkedIn Learning
Course Description
Overview
Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
Syllabus
Introduction
- Understanding and defeating denial-of-service attacks
- What you should know
- Disclaimer
- Understanding denial of service
- Using Python to test denial of service
- TCP SYN flooding using hping3
- Using Hyena to run a reflection attack
- UDP flooding with LOIC
- ARP poisoning with Ettercap
- Using NTP to amplify attacks
- NEW: Amplification using memcached
- NEW: When is a DDoS not a DDoS?
- Deauthenticating a wireless host
- Flooding HTTP using GoldenEye
- Testing webapps using OWASP SwitchBlade
- Understanding BlackEnergy
- Killing the FTP service
- RangeAmp attacks on the CDN
- Profiling Killnet
- Flooding a SIP server
- Explaining ransomware
- Understanding Cryptolocker
- Understanding Petya
- Defeating denial-of-service attacks
- Commercial anti-DOS services
- Detecting P2P attacks with PeerShark
- NIST guidance on mitigating DDOS
- Considering IoT denial
- Summary
Taught by
Malcolm Shore
Related Courses
Real world Hacking & Penetration testing: Version-1Udemy Hacking Laboratuvarınızı Oluşturun
Udemy Ethical Hacking: Wireless Networks
LinkedIn Learning Cisco ISE v2.4 Video Training
Udemy Complete Cyber Security Course: The Network Security A-Z™
Udemy