Ethical Hacking: Denial of Service
Pluralsight
Course Summary
Don't let yourself fall prone to a hacker's denial of service attack! This course identifies various motivations, attack patterns, and defenses to help protect against the risk of DoS.
-
+
Course Description
Denial of service attacks typically seek to render a service unavailable by flooding it with malicious traffic so that it becomes unresponsive to legitimate requests. In this course, Ethical Hacking: Denial of Service (part of the Ethical Hacking series), you'll look at the purposes of these attacks, ranging from disrupting gaming adversaries, to hacktivism, and to law enforcement by government agencies. You'll also explore various ways attacks are constructed and the weaknesses they exploit in order to be successful. Finally, you'll delve into defensive patterns to help protect services from malicious attacks. By the end of this course, you'll have a much better understanding of denial of service attacks and how to protect yourself from them.
-
+
Course Syllabus
Understanding Denial of Service Attacks- 38m 46s
—Overview 2m 49s
—The Rise and Rise of DoS Attacks 4m 6s
—Defining DoS Attacks 2m 59s
—Distributed Denial of Service Attacks 2m 55s
—Visualizing DDoS Attacks with Norse 2m 39s
—What Makes DoS Attacks so Effective? 3m 23s
—Motivations for DDoS 11m 26s
—Unintentional DoS 3m 38s
—The Impact of DoS Attacks 2m 54s
—Summary 1m 53sAttack Techniques- 52m 58s
—Overview 2m 38s
—The OSI Model of Computer Networking 2m 34s
—The Role of Botnets in DDoS Attacks 4m 34s
—HTTP Flood Attacks 10m 1s
—SYN Flood Attacks 3m 12s
—UDP and ICMP Attacks 3m 44s
—Attack Reflection and Amplification 7m 57s
—Peer-to-Peer Attacks 1m 45s
—Slowloris 1m 52s
—Permanent DoS and Phlashing 2m 8s
—GitHub's 'Man on the Side' Attack 5m 33s
—A Complex DDoS Attack Case Study 4m 27s
—Summary 2m 26sTools and Services- 31m 53sDefending Against Attacks- 45m 53s