Ethical Hacking: Denial of Service
Offered By: LinkedIn Learning
Course Description
Overview
Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
Syllabus
Introduction
- Understanding and defeating denial-of-service attacks
- What you should know
- Disclaimer
- Understanding denial of service
- Using Python to test denial of service
- TCP SYN flooding using hping3
- Using Hyena to run a reflection attack
- UDP flooding with LOIC
- ARP poisoning with Ettercap
- Using NTP to amplify attacks
- NEW: Amplification using memcached
- NEW: When is a DDoS not a DDoS?
- Deauthenticating a wireless host
- Flooding HTTP using GoldenEye
- Testing webapps using OWASP SwitchBlade
- Understanding BlackEnergy
- Killing the FTP service
- RangeAmp attacks on the CDN
- Profiling Killnet
- Flooding a SIP server
- Explaining ransomware
- Understanding Cryptolocker
- Understanding Petya
- Defeating denial-of-service attacks
- Commercial anti-DOS services
- Detecting P2P attacks with PeerShark
- NIST guidance on mitigating DDOS
- Considering IoT denial
- Summary
Taught by
Malcolm Shore
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity