DDoS Attacks and Defenses

  • 4.5
Approx. 15 hours to complete

Course Summary

Learn how to defend against DDoS attacks with this comprehensive course that covers the latest attack techniques and mitigation strategies.

Key Learning Points

  • Understand the different types of DDoS attacks and how they work
  • Learn about the latest attack techniques and tools used by attackers
  • Discover effective mitigation strategies to protect your organization

Job Positions & Salaries of people who have taken this course might have

    • USA: $92,000
    • India: ₹7,00,000
    • Spain: €45,000
    • USA: $92,000
    • India: ₹7,00,000
    • Spain: €45,000

    • USA: $81,000
    • India: ₹6,00,000
    • Spain: €35,000
    • USA: $92,000
    • India: ₹7,00,000
    • Spain: €45,000

    • USA: $81,000
    • India: ₹6,00,000
    • Spain: €35,000

    • USA: $115,000
    • India: ₹13,00,000
    • Spain: €60,000

Related Topics for further study


Learning Outcomes

  • Understand the different types of DDoS attacks and how they work
  • Learn the latest attack techniques and tools used by attackers
  • Develop effective mitigation strategies to protect your organization

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of network security
  • Familiarity with cybersecurity concepts

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced
  • Video lectures

Similar Courses

  • Network Security
  • Cybersecurity Essentials

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Mikko Hyppönen

Related Books

Description

In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks.

Outline

  • DDoS Attacks
  • Welcome to DDoS Attack and Defense Course
  • History of DDoS
  • Mirai DDoS Attacks
  • Mirai Source Code Analysis
  • DDoS Attack Cases
  • History of DDoS: from digital civil disobedience to online censorship
  • Breaking Down Mirai: An IoT DDoS Botnet Analysis
  • Mirai Source Code Analysis
  • Practice Quiz 2.1.2. Mirai DDoS Characteristics
  • Practice Quiz 2.1.3 . Mirai Malware Analysis
  • Quiz 2.1 History of DDoS Attacks
  • DDoS Defenses
  • DDoS Defense Challenges and the Approaches
  • Major DDoS Defense Techniques
  • Intrusion Response and Intrusion Tolerance
  • Technical overview of DDoS and mitigation techniques
  • Survey of Major Techniques in DDoS Defense
  • Intrusion Tolerance Literature
  • Practice Quiz 2.2.1. Challenges in DDoS Defense
  • Practice Quiz. 2.2.2. Unsupervised Anomaly-based Malware Detection Techniques
  • Practice Quiz. 2.2.3 Intrusion Tolerance Autonomic Response Systems
  • Quiz: DDoS Defenses 2.2.
  • DDoS Defense Systems and Techniques
  • Autonomous Anti-DDoS Network
  • Performance of CBQ/Rate Limit on DDoS Traffic
  • A2D2 Design and Implementation,
  • A2D2 DDoS Defense Experiments
  • Practice Quiz. 2.3.1
  • Practice Quiz: 2.3.2 DDoS Impact Analysis
  • Exam 2.3 DDoS Defense Systems and Techniques
  • Intrusion Tolerance with Proxy-based Multipath Routing
  • SCOLD: An Intrusion Tolerance Implementation
  • SCOLD Features and Benefits
  • Intrusion Tolerant Architecture
  • Intrusion-Tolerant Eclipse SCADA
  • On proxy server based multipath connection
  • Practice Quiz 2.4.1.
  • Practice Quiz. 2.4.2
  • Quiz 2.4 Intrusion Tolerance

Summary of User Reviews

This course on DDoS attacks and defense has received positive reviews from many users. They have praised the course for its comprehensive coverage of the topic and practical approach. Overall, users found the course to be informative and engaging.

Key Aspect Users Liked About This Course

The course was praised for its practical approach and real-world examples that helped users understand the concepts better.

Pros from User Reviews

  • Comprehensive coverage of DDoS attacks and defense
  • Real-world examples and practical approach
  • Engaging and informative content
  • Experienced instructor with a deep understanding of the topic
  • Interactive quizzes and exercises for better retention

Cons from User Reviews

  • Some users found the course to be too basic and lacking in advanced concepts
  • The pace of the course may be too slow for some users
  • The course may not be suitable for advanced users looking for in-depth technical knowledge
English
Available now
Approx. 15 hours to complete
Edward Chow
University of Colorado System
Coursera

Instructor

Edward Chow

  • 4.5 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses