Summarise the course and look at what's next
- [Voiceover] I'd really like to thank you for joining me for this course. I hope you enjoyed this foray into denial of service testing. There's always something new to learn about in cyber security. And if you're interested, then check out the other courses in the cyber security segment to the library where new security testing courses are added regularly. I'd like to invite you to go to my author page where you can find some additional courses on cyber security. If you want to get hands-on with some of the common tools, then do take a look at Practical Cyber Security and Introduction to Kali Linux.
If you're wanting to learn about security for the cloud, then Cyber Security for Cloud Computing is for you. I'd also like to invite you to go take a look at Lisa Bock's author page where you'll find more courses in the Ethical Hacking series. Lisa also has some great information security courses that you can take. Thanks again for joining me on this course, and I hope to see you again soon.
Note: Our Ethical Hacking series will map to the 18 parts of the EC-Council's certification exam. This course maps to the 09 Denial of Service domain.
- What is denial of service?
- SYN flooding
- Smurf and URL flooding
- Deauthenticating a wireless host
- Flooding HTTP
- Using BlackEnergy
- Flooding SIP
- Detecting DoS with PeerShark
- Defeating DoS attacks