T. W. LINX
C. M. IX Reach
DDOS demystified training course contents
What is DOS?
Denial Of Service, outages, Attackers, Command and control, Bots. Why DOS?
What is DDOS?
Distributed, reflectors, botnets, botnet topologies, amplification, attack bandwidth, attack vectors, booters, stressers, backscatter, DirtJumper, XOR. RUDY. High and Low orbit Ion Cannon.
Application layer attacks, HTTP flood, protocol attacks, SYN floods, teardrop, volumetric attacks, slowloris, DNS cachebusting, fraggle, smurf. IP address spoofing.
Reflector attacks, amplification attacks, quotients, embedded devices, DNS, NTP, SSDP.
Protecting devices from becoming bots. Onsite, outsourced scrubbing, Defending self, defending the Internet, Black hole routing, rate limiting, intelligent application firewalls, anycast, IPS, upstream filtering, BCP38, BCP 140. uRPF.
Why Choose Us
SNT trainers score an average of over 90% on the three main areas of:
- Ability to teach
- Technical knowledge
- Answering questions
We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM
We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.