This course covers DDOS attacks and how to defend against them. The course starts by studying DOS attacks and then DDOS attack. Reflectors, booters and stressers are followed by reflection and amplification. Once the various DDOS attacks have been covered we then study the ways to defend against DDOS attacks.
Denial Of Service, outages, Attackers, Command and control, Bots. Why DOS?
Distributed, reflectors, botnets, botnet topologies, amplification, attack bandwidth, attack vectors, booters, stressers, backscatter, DirtJumper, XOR. RUDY. High and Low orbit Ion Cannon.
Application layer attacks, HTTP flood, protocol attacks, SYN floods, teardrop, volumetric attacks, slowloris, DNS cachebusting, fraggle, smurf. IP address spoofing.
Reflector attacks, amplification attacks, quotients, embedded devices, DNS, NTP, SSDP.
Protecting devices from becoming bots. Onsite, outsourced scrubbing, Defending self, defending the Internet, Black hole routing, rate limiting, intelligent application firewalls, anycast, IPS, upstream filtering, BCP38, BCP 140. uRPF.
"A good intro to a complex subject."
"Course was a real eye-opener to some of the barriers we encounter."
This structured training course seeks to build upon workbook learning through the use of group exercises, dynamic discussion and individual tasks in order to deliver an engaging and interactive module that will ensure all candidates are able to transfer their new skills into the workplace.