Students
Tuition Fee
Not Available
Start Date
Not Available
Medium of studying
Fully Online
Duration
8 weeks
Details
Program Details
Degree
Courses
Major
Computer Science | Cybersecurity | Network Security
Area of study
Information and Communication Technologies | Security Services
Education type
Fully Online
Course Language
English
About Program

Program Overview


DDoS Attacks and Defenses

About This Course

In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. You will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks.


Prerequisites

For the pre-requisites, we recommend the learners take the Design and Analyze Secure Networked Systems course to learn the basic security concepts and principles and take the Secure Networked System with Firewall and IDS courses to learn the basic firewall and IDS systems.


Course Details

  • Language: English
  • User Ratings: 4.5
  • Level: Beginner
  • Commitment: Suggested 8 hours/week

Program Structure

The program is designed to provide a comprehensive understanding of DDoS attacks and defenses, including the analysis of new Mirai IoT Malware and the development of strategies for dealing with future DDoS attacks. The course covers various topics, including:


  • History of DDoS attacks
  • DDoS Defense techniques
  • Autonomous Anti-DDoS Network (A2D2)
  • Linux Firewall Rate limiting and Class Based Queueing
  • Subnet flood detection
  • Intrusion tolerance paradigm with proxy-based multipath routing
See More