Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

University of Colorado System

DDoS Attacks and Defenses

University of Colorado System via Coursera

Overview

In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks.

For the pre-requisites, we recommend the learners take the Design and Analyze Secure Networked Systems course to learn the basic security concepts and principles and take the Secure Networked System with Firewall and IDS courses to learn the basic firewall and IDS systems.

Taught by

Edward Chow

Reviews

5.0 rating, based on 2 Class Central reviews

Start your review of DDoS Attacks and Defenses

  • Profile image for Pauline Vinck
    Pauline Vinck
    Need A Hacker Who Can Recover Stolen Or scam*ed BTC?Lost Recovery Masters Got You.

    If you need a genuine hacker who can recover stolen or scam*ed Cryptocurrency RECOVERYMASTERS got you covered, they're secured Hacker from USA who deal with cyber issues of all kind, such as WhatsApp hack, Facebook hack, gmail hack, mobile phone hack, accounts hack, erase criminal records, websites hack, Bitcoin Trade recovery, and other hack relating to cyber issues.
    Contact them at Mail info: ([email protected]) or whatsapp +1(204)819-5505 Learn more https://lostrecoverymaster.com/
  • Waseem Sajjad
    Must learn about DDoS attacks and it defenses. In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.