🚨 $100K in Sight: Follow Bitcoin’s Final Push Live! TRACK NOW
watching now
14 Students

Description

What Will You Learn?

  • All the secrets of the attackers for performing a DDoS attack and efficient detection & mitigation techniques
  • Protecting your website and/or web services against various popular DDoS attack vectors
  • Protecting your network and infrastructure against various popular DDoS attacks vectors
  • For every DDoS vector, detailed detection and mitigation techniques, best practices
  • Advises for proper configuration of network components (firewalls, routers, rate controls, load balancers, CDNs etc.)

Requirements

  • For network-related vectors: basic knowledge on popular network protocols on different layers (IP, ICMP, TCP, UDP etc.)
  • For network-related vectors: good understanding of TCP and IP headers
  • For Web-related vectors: good understanding of HTTP and basic knowledge on other Web protocols
  • Some experience with Wireshark would be useful
  • NFT Certificate
  • 39 Lessons
  • Intermediate
  • English
  • 4.5 Rating
  • +110 XP

Share Course on Social media

Curriculum

Course consist of total 2h 4min of content, in total.

Section 1: Introduction
07:01
Section 2: Definitions
05:49
Section 3: TCP/IP Model: Physical&Data Link (Network Access) Layer
02:08
Section 4: TCP/IP Model: Internet (Network) Layer
11:26
Internet (Network) Layer Overview
00:21
Internet (Network) Layer Attack Vector #1
04:59
Internet (Network) Layer Attack Vector #2
06:06
Section 5: TCP/IP Model: Transport Layer
01:41
TCP/IP Model: Transport Layer Overview
01:41
Section 6: TCP/IP Model Transport Layer: TCP
31:22
TCP/IP Model Transport Layer: TCP Attack Vector #1
03:26
TCP Attack Vector #1: Response Challenges
13:13
TCP Attack Vector #2
04:02
TCP Attack Vector #3
04:57
TCP Attack Vector #4
03:39
TCP Attack Vector #5
02:05
Section 7: TCP/IP Model Transport Layer: UDP
06:09
UDP Attack Vector #1
05:19
UDP Attack Vector #2
A shady method to block IP-based attacks (e.g. TCP, UDP)
Section 8: TCP/IP Model: Application Layer
01:14
Overview
01:14
Section 9: TCP/IP Model Application Layer: Web
18:16
Web Attack Vector #1
06:49
Web Attack Vector #1 Response Challenges
05:41
A brief note
Web Attack Vector #2
05:27
Resources
Section 10: TCP/IP Model Application Layer: DNS
11:37
DNS Attack Vector #1
07:35
DNS Attack Vector #2
03:56
Resources
Section 11: TCP/IP Model Application Layer: Remaining Protocols
05:11
Remaining Protocols Attack Vector #1-4
02:59
Remaining Protocols Attack Vector #5
02:12
Section 12: Protection&Mitigation
09:42
Protection&Mitigation Overview
01:00
Proper Firewall Configuration
02:04
Rate Controls
03:56
Proper Load Balancer and Router Configuration
02:31
Testing your websites and/or Web services against DDoS
Resources
Section 13: Protection with CDNs
12:00
Does CDN protect you against DDoS?
06:14
Important Things to Consider choosing a CDN Solution
02:00
Section 14: Conclusion
01:09
Conclusion
01:09

About the Instructor

Digest Academy is commited to provide tech courses in nugget form. None of our courses takes longer than 3 hours, which makes them quite easily "digestable" for you! All the important topics are refined, no fluff, just pure information!

Check our Youtube Channel for free content as well as Linkedin Page for new course announcements and discounts.

See All Instructor Courses

Course reviews