Speak to our team now +44 (0)1737 821590

DDOS demystified

A 1 day training course

DDOS demystified training course description

This course covers DDOS attacks and how to defend against them. The course starts by studying DOS attacks and then DDOS attack. Reflectors, booters and stressers are followed by reflection and amplification. Once the various DDOS attacks have been covered we then study the ways to defend against DDOS attacks.

Key outcomes from this course

By the end of the course delegates will be able to:
  • Describe DDOS.
  • Explain how DDOS attacks work.
  • Recognise DDOS attack types.
  • Describe how to defend DDOS attacks.

DDOS demystified training course details

Who will benefit:
Anyone involved in network security.
Prerequisites:
Network fundamentals
Duration:
1 day

Training approach

This structured course uses Instructor Led Training to provide the best possible learning experience. Small class sizes ensure students benefit from our engaging and interactive style of teaching with delegates encouraged to ask questions throughout the course. Quizzes follow each major section allowing checking of learning.

Overall rating:

Customer reviews


"Kept it interesting and fun!"
T. W. LINX
"Very interesting and informative. "
C. M. IX Reach

DDOS demystified training course contents

What is DOS?
Denial Of Service, outages, Attackers, Command and control, Bots. Why DOS?

What is DDOS?
Distributed, reflectors, botnets, botnet topologies, amplification, attack bandwidth, attack vectors, booters, stressers, backscatter, DirtJumper, XOR. RUDY. High and Low orbit Ion Cannon.

Attack types
Application layer attacks, HTTP flood, protocol attacks, SYN floods, teardrop, volumetric attacks, slowloris, DNS cachebusting, fraggle, smurf. IP address spoofing.

Reflectors
Reflector attacks, amplification attacks, quotients, embedded devices, DNS, NTP, SSDP.

DDOS defence
Protecting devices from becoming bots. Onsite, outsourced scrubbing, Defending self, defending the Internet, Black hole routing, rate limiting, intelligent application firewalls, anycast, IPS, upstream filtering, BCP38, BCP 140. uRPF.

Why Choose Us

SNT trainers score an average of over 90% on the three main areas of:
  • Ability to teach
  • Technical knowledge
  • Answering questions
“Excellently presented by a very knowledgeable and enthusiastic trainer.” P.D. General Dynamics

We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM

We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.

See Dates & Prices for this course

To enquire about this course

To reserve this course online