Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
- [Voiceover] In the digital world, cyber attack has unfortunately become an everyday occurrence. Cyber attacks general take one of three forms, intrusion, or denial of service. I'm Malcolm Shore and I've spent a career helping governments and businesses protect their systems against cyber attacks. In this course, I'll explore how denial of service attacks work, and I'll look at the tools used to test systems and networks for resilience to a denial of service attack.
I'll start by explaining what a denial of service is, and I'll demonstrate some of the more popular attacks. I'll then look at how some of the more sophisticated attacks work, and I'll finish by looking at how we can protect our systems against such attacks. When you finish this course, you'll have a great understanding of how to test for denial of service weaknesses.
Note: Our Ethical Hacking series will map to the 18 parts of the EC-Council's certification exam. This course maps to the 09 Denial of Service domain.
- What is denial of service?
- SYN flooding
- Smurf and URL flooding
- Deauthenticating a wireless host
- Flooding HTTP
- Using BlackEnergy
- Flooding SIP
- Detecting DoS with PeerShark
- Defeating DoS attacks