Ethical Hacking: Denial of Service
Pluralsight is not an official partner or accredited training center of EC-Council. This course identifies various motivations, attack patterns, and defenses to help protect against the risk of DoS.
What you'll learn
Pluralsight is not an official partner or accredited training center of EC-Council. Denial of service attacks typically seek to render a service unavailable by flooding it with malicious traffic so that it becomes unresponsive to legitimate requests. In this course, Ethical Hacking: Denial of Service (part of the Ethical Hacking series), you'll look at the purposes of these attacks, ranging from disrupting gaming adversaries, to hacktivism, and to law enforcement by government agencies. You'll also explore various ways attacks are constructed and the weaknesses they exploit in order to be successful. Finally, you'll delve into defensive patterns to help protect services from malicious attacks. By the end of this course, you'll have a much better understanding of denial of service attacks and how to protect yourself from them.
Table of contents
- Overview 3m
- The OSI Model of Computer Networking 3m
- The Role of Botnets in DDoS Attacks 5m
- HTTP Flood Attacks 10m
- SYN Flood Attacks 3m
- UDP and ICMP Attacks 4m
- Attack Reflection and Amplification 8m
- Peer-to-Peer Attacks 2m
- Slowloris 2m
- Permanent DoS and Phlashing 2m
- GitHub's 'Man on the Side' Attack 6m
- A Complex DDoS Attack Case Study 4m
- Summary 2m