We may earn an affiliate commission when you visit our partners.
Course image
Edward Chow

In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks.

Read more

In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks.

For the pre-requisites, we recommend the learners take the Design and Analyze Secure Networked Systems course to learn the basic security concepts and principles and take the Secure Networked System with Firewall and IDS courses to learn the basic firewall and IDS systems.

Enroll now

What's inside

Syllabus

DDoS Attacks
In this MOOC, you will learn the history of DDoS attacks, get an in-depth look at the characteristics new Mirai IoT Malware attack. You will know how to analyze the Mirai source code and understand its design and implementation details. You will also see how forensic evidences pointed where it was designed. By the end of the course, you are able to take a new DDoS malware and perform detailed analysis and collect forensic evidences.
Read more
DDoS Defenses
In this module, you will be provided a brief overview of Basic DDoS Defense techniques. By the end of this course, you should be able to deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks.
DDoS Defense Systems and Techniques
In this module, you learn an Autonomous Anti-DDoS Network called A2D2 suitable for small/medium size business to deal DDoS defense. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn how to analyze effectiveness of these different defense mechanisms. By the end of this course, you should be able to deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks.
Intrusion Tolerance with Proxy-based Multipath Routing
In this module you learn a new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. You learn the development of such new security mechanism also improves the performance and reliability of the system, and does not have to be just an overhead.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Suitable for beginners who want to learn DDoS malware analysis and defense techniques
Provides a comprehensive overview of DDoS attacks and their evolution, including the Mirai IoT Malware
Offers hands-on experience in deploying defense mechanisms like Linux Firewall Rate limiting and Class Based Queueing
Incorporates a novel Intrusion Tolerance paradigm with proxy-based multipath routing for DDoS defense
Prerequisites include foundational knowledge of security concepts and firewall and IDS systems, which may require additional preparation

Save this course

Save DDoS Attacks and Defenses to your list so you can find it easily later:
Save

Reviews summary

Engaging course on ddos attacks

Learners say that this course on DDoS attacks and defenses is highly engaging and well-organized with informative content. Despite a few issues with lecturer accent, learners appreciate clear subtitles, plenty of resources, and in-depth coverage of concepts.
Quizzes and tests effectively reinforce learning.
"Very Noice"
"Extremely interesting class!"
"Really productive."
Subtitles are helpful in understanding lectures.
"the subtitles were great help"
"I had difficulty in understanding the accent of the instructor but the subtitles were great help"
Course offers valuable information on DDoS basics.
"It is a wonderful course on DDoS basics and defense techniques."
"Good course for gaining knowledge"
"I got to learn many thing regarding Network Security which will help me in future."
Course may experience some technical issues.
"overall course consents are god but question and answer in quiz's are so disorderly"
"The given information is overall good, but the user experience of the tests is very bad due to many coursera bugs"
"Very hard to understand, as well very boring. Test were all over the place as well thy were not aligned correctly"
Instructor's accent can be difficult to understand.
"can't understand almost anything because of the difficult dialect.."
"Good basic content but instructor hard to understand"
"I had difficulty in understanding the accent of the instructor"

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in DDoS Attacks and Defenses with these activities:
Review DDoS Attack Vectors
Refresh your knowledge on common DDoS attack vectors to better understand the topics covered in the course.
Browse courses on DDoS Attacks
Show steps
  • Review the different types of DDoS attacks, such as volumetric attacks, protocol attacks, and application-layer attacks.
Review Computer Networking: A Top-Down Approach
Review the basic principles of computer networking to prepare for the advanced DDoS topics covered in the course.
Show steps
  • Read Chapters 1-3 of the textbook to cover the architectural principles, applications, and protocols of computer networking.
Tutorial on Mirai Malware Analysis
Familiarize yourself with the analysis techniques used to understand the Mirai malware covered in the course.
Show steps
  • Complete the tutorial on Mirai malware analysis provided by the SANS Institute.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Firewall Rule Configuration Practice
Sharpen your skills in configuring firewall rules to mitigate DDoS attacks as covered in the course.
Browse courses on Firewall rules
Show steps
  • Set up a virtual environment with a Linux firewall.
  • Practice configuring firewall rules to block specific IP addresses, ports, and protocols.
Contribute to OpenDDoS Project
Contribute to the development of OpenDDoS, an open-source DDoS mitigation tool, to gain hands-on experience.
Show steps
  • Familiarize yourself with the OpenDDoS project and its documentation.
  • Identify an area where you can contribute, such as code development, testing, or documentation improvement.
  • Submit a pull request with your contributions.
DDoS Mitigation Strategy Development
Develop a comprehensive DDoS mitigation strategy for your organization to enhance your preparedness.
Show steps
  • Analyze your network infrastructure and identify potential DDoS vulnerabilities.
  • Research and evaluate different DDoS mitigation techniques and technologies.
  • Design a DDoS mitigation plan that outlines the roles, responsibilities, and procedures for responding to and mitigating DDoS attacks.
  • Implement the DDoS mitigation plan and conduct regular testing to ensure its effectiveness.
Network Security Audit Report
Conduct a thorough audit of your network security to identify potential vulnerabilities and DDoS threats.
Show steps
  • Gather information about your network infrastructure, including devices, configurations, and policies.
  • Perform vulnerability scans and penetration tests to identify security weaknesses.
  • Analyze the results and prioritize the vulnerabilities that need to be addressed.
  • Develop a plan to mitigate the identified vulnerabilities.
  • Write a comprehensive report summarizing the audit findings and recommendations.
Capture the Flag Competition
Participate in a Capture the Flag competition to test your DDoS mitigation skills and gain practical experience.
Browse courses on network security
Show steps
  • Find a Capture the Flag competition that focuses on network security and DDoS mitigation.
  • Form a team or participate individually.
  • Solve challenges and complete tasks related to DDoS attacks and defense mechanisms.

Career center

Learners who complete DDoS Attacks and Defenses will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They design, implement, and manage security measures, such as firewalls, intrusion detection systems, and encryption. Information Security Analysts also monitor and analyze security logs and alerts to identify and respond to threats. This course will be useful for those who want to become Information Security Analysts because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
Risk Analyst
Risk Analysts identify and assess risks to an organization's computer networks and systems. They develop and implement risk mitigation strategies, and they monitor and analyze risk data to identify and respond to emerging threats. This course may be useful for those who want to become Risk Analysts because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures to protect an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and analyze network traffic to identify and respond to security threats. This course may be useful for those who want to become Network Security Engineers because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
Security Consultant
Security Consultants help organizations to identify and mitigate security risks. They assess an organization's security posture, develop and implement security plans, and train employees on security best practices. Security Consultants also work with law enforcement and other government agencies to investigate and respond to security incidents. This course may be useful for those who want to become Security Consultants because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
Incident Responder
Incident Responders are responsible for responding to and mitigating security breaches. They work with other IT professionals to identify and contain the breach, and they collect and analyze evidence to help law enforcement investigate the incident. Incident Responders also help organizations to develop and implement security measures to prevent and mitigate future breaches. This course may be useful for those who want to become Incident Responders because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security measures to protect an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and analyze network traffic to identify and respond to security threats. This course may be useful for those who want to become Cybersecurity Engineers because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
Penetration Tester
Penetration Testers are responsible for identifying and exploiting vulnerabilities in an organization's computer networks and systems. They use a variety of techniques, such as social engineering, hacking, and malware analysis, to gain unauthorized access to systems and data. Penetration Testers also help organizations to develop and implement security measures to prevent and mitigate security breaches. This course may be useful for those who want to become Penetration Testers because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
Malware Analyst
Malware Analysts investigate and analyze malware to identify its capabilities and how it can be used to attack computer networks and systems. They also develop and implement malware detection and prevention measures. This course may be useful for those who want to become Malware Analysts because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
Security Architect
Security Architects design and implement security measures to protect an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and analyze network traffic to identify and respond to security threats. This course may be useful for those who want to become Security Architects because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for overseeing an organization's information security program. They develop and implement security policies and procedures, and they manage the organization's security team. CISOs also work with other executives to ensure that the organization's security program is aligned with its business goals. This course may be useful for those who want to become CISOs because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
Forensic Analyst
Forensic Analysts investigate and analyze computer systems and networks to identify and preserve evidence of criminal activity. They also provide expert testimony in court cases. Forensic Analysts typically have a background in computer science, law enforcement, or both. This course may be useful for those who want to become Forensic Analysts because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
Security Operations Manager
Security Operations Managers are responsible for managing an organization's security operations center (SOC). They oversee the day-to-day operations of the SOC, and they work with other IT professionals to identify and respond to security threats. This course may be useful for those who want to become Security Operations Managers because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
IT Auditor
IT Auditors are responsible for auditing an organization's computer networks and systems to ensure that they are secure and compliant with applicable laws and regulations. They also provide consulting services to help organizations improve their security posture. This course may be useful for those who want to become IT Auditors because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.
Security Program Manager
Security Program Managers are responsible for planning, implementing, and managing an organization's security program. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and analyze network traffic to identify and respond to security threats. This course may be useful for those who want to become Security Program Managers because it provides an overview of DDoS attacks and defenses. The course also teaches students how to use Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types.

Reading list

We've selected 15 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in DDoS Attacks and Defenses.
Provides a comprehensive guide to security engineering, including a discussion of DDoS attacks and mitigation strategies.
Reference book for TCP/IP protocols, very detailed and comprehensive.
Provides a detailed overview of DDoS attacks and defenses, including practical, hands-on techniques for defending against DDoS attacks.
Provides techniques for assessing network security posture.
Comprehensive guide to network security, covering a wide range of topics, including DDoS attacks and defenses.
Provides a comprehensive overview of network security essentials, including DDoS attacks and defenses.
Provides a comprehensive overview of computer security principles and practices, including DDoS attacks and defenses.
Comprehensive guide to network security, covering a wide range of topics, including DDoS attacks and defenses.
Provides a comprehensive overview of firewalls and intrusion detection systems.
Helps you cover the basics of designing, implementing, and monitoring firewalls, and also covers the latest firewall technologies and configurations.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to DDoS Attacks and Defenses.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser