University of Colorado Boulder - DDoS Attacks and Defenses
- Offered byCoursera
DDoS Attacks and Defenses at Coursera Overview
Duration | 15 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
DDoS Attacks and Defenses at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 2 of 4 in the Advanced System Security Design Specialization
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Beginner Level
- Approx. 15 hours to complete
- English Subtitles: French, Portuguese (European), Russian, English, Spanish
DDoS Attacks and Defenses at Coursera Course details
- In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks.
- For the pre-requisites, we recommend the learners take the Design and Analyze Secure Networked Systems course to learn the basic security concepts and principles and take the Secure Networked System with Firewall and IDS courses to learn the basic firewall and IDS systems.
DDoS Attacks and Defenses at Coursera Curriculum
DDoS Attacks
Welcome to DDoS Attack and Defense Course
History of DDoS
Mirai DDoS Attacks
Mirai Source Code Analysis
DDoS Attack Cases
History of DDoS: from digital civil disobedience to online censorship
Breaking Down Mirai: An IoT DDoS Botnet Analysis
Mirai Source Code Analysis
Practice Quiz 2.1.2. Mirai DDoS Characteristics
Practice Quiz 2.1.3 . Mirai Malware Analysis
Quiz 2.1 History of DDoS Attacks
DDoS Defenses
DDoS Defense Challenges and the Approaches
Major DDoS Defense Techniques
Intrusion Response and Intrusion Tolerance
Technical overview of DDoS and mitigation techniques
Survey of Major Techniques in DDoS Defense
Intrusion Tolerance Literature
Practice Quiz 2.2.1. Challenges in DDoS Defense
Practice Quiz. 2.2.2. Unsupervised Anomaly-based Malware Detection Techniques
Practice Quiz. 2.2.3 Intrusion Tolerance Autonomic Response Systems
Quiz: DDoS Defenses 2.2.
DDoS Defense Systems and Techniques
Autonomous Anti-DDoS Network
Performance of CBQ/Rate Limit on DDoS Traffic
A2D2 Design and Implementation,
A2D2 DDoS Defense Experiments
Practice Quiz. 2.3.1
Practice Quiz: 2.3.2 DDoS Impact Analysis
Exam 2.3 DDoS Defense Systems and Techniques
Intrusion Tolerance with Proxy-based Multipath Routing
SCOLD: An Intrusion Tolerance Implementation
SCOLD Features and Benefits
Intrusion Tolerant Architecture
Intrusion-Tolerant Eclipse SCADA
On proxy server based multipath connection
Practice Quiz 2.4.1.
Practice Quiz. 2.4.2
Quiz 2.4 Intrusion Tolerance