Author
Updated
1/8/2021Released
3/25/2019- What is denial of service?
- TCP SYN, Smurf, and UDP flooding
- Deauthenticating a wireless host
- Flooding HTTP
- Using BlackEnergy
- Flooding a SIP server
- Detecting P2P attacks with PeerShark
- Defeating DoS attacks
Skill Level Intermediate
Duration
Views
- [Instructor] In the digital world, cyber attack has unfortunately become an everyday occurrence. One of the common forms of attack is Denial of Service, which may be a state sponsored attack against critical infrastructure, criminal extortion against a business or just vandalism by hacktivists or amateur hackers. As we go through the course, I'll explain what to Denial of Service is, demonstrate some of the more popular attack tools and then look at how ransomware works. I'll finish by looking at how to protect our systems against Denial of Service. I'm Malcolm Shore and I've spent a career helping governments and businesses protect their systems against cyber attacks. I'd like to invite you to take this LinkedIn learning course and learn how to avoid becoming a victim of Denial of Service attacks. Now let's get started with Denial of Service.
Related Courses
-
Penetration Testing: Advanced Kali Linux
with Malcolm Shore2h 22m Intermediate -
Penetration Testing Essential Training
with Malcolm Shore2h 29m Intermediate -
Ethical Hacking: Hacking IoT Devices
with Luciano Ferrari35m 22s Intermediate
-
Introduction
-
Disclaimer1m 12s
-
1. What Is a Denial of Service?
-
2. Infrastructure Denial of Service
-
UDP flooding with LOIC3m 16s
-
ARP poisoning with Ettercap5m 13s
-
Using NTP to amplify attacks5m 55s
-
3. Wireless Denial of Service
-
4. Application Denial of Service
-
Understanding BlackEnergy6m 12s
-
Killing the FTP service1m 42s
-
RangeAmp attacks on the CDN1m 10s
-
5. SIP Service Attacks
-
Flooding a SIP server6m 9s
-
-
6. Ransomware
-
Explaining ransomware3m 42s
-
Understanding Cryptolocker2m 44s
-
Understanding Petya2m 28s
-
-
7. Mitigation Techniques
-
Commercial anti-DOS services1m 49s
-
Considering IoT denial2m 53s
-
Conclusion
-
Summary1m 2s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Understanding and defeating denial-of-service attacks