Ethical Hacking: Denial of Service
Offered By: LinkedIn Learning
Course Description
Overview
Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
Syllabus
Introduction
- Understanding and defeating denial-of-service attacks
- What you should know
- Disclaimer
- Understanding denial of service
- Using Python to test denial of service
- TCP SYN flooding using hping3
- Using Hyena to run a reflection attack
- UDP flooding with LOIC
- ARP poisoning with Ettercap
- Using NTP to amplify attacks
- NEW: Amplification using memcached
- NEW: When is a DDoS not a DDoS?
- Deauthenticating a wireless host
- Flooding HTTP using GoldenEye
- Testing webapps using OWASP SwitchBlade
- Understanding BlackEnergy
- Killing the FTP service
- RangeAmp attacks on the CDN
- Profiling Killnet
- Flooding a SIP server
- Explaining ransomware
- Understanding Cryptolocker
- Understanding Petya
- Defeating denial-of-service attacks
- Commercial anti-DOS services
- Detecting P2P attacks with PeerShark
- NIST guidance on mitigating DDOS
- Considering IoT denial
- Summary
Taught by
Malcolm Shore
Related Courses
5G for EveryoneQualcomm via Coursera Advanced Cyber Security Training
EC-Council via FutureLearn Working with tcpdump Filters
Coursera Project Network via Coursera Cloud Computing Fundamentals on Alibaba Cloud
Alibaba Cloud Academy via Coursera Protecting Cloud Architecture with Alibaba Cloud
Alibaba via Coursera