Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: Denial of Service

via LinkedIn Learning

Overview

Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.

Ethical hacking involves testing to see if an organization's network is vulnerable to outside threats. Denial-of-service (DoS) attacks are one of the biggest threats out there. Being able to mitigate DoS attacks is one of the most desired skills for any IT security professional—and a key topic on the Certified Ethical Hacker exam. In this course, learn about the history of the major DoS attacks and the types of techniques hackers use to cripple wired and wireless networks, applications, and services on the infrastructure. Instructor Malcolm Shore covers the basic methods hackers use to flood networks and damage services, the rising threat of ransomware like Cryptolocker, mitigation techniques for detecting and defeating DoS attacks, and more.

Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10.

Syllabus

Introduction
  • Understanding and defeating denial-of-service attacks
  • What you should know
  • Disclaimer
1. What Is a Denial of Service?
  • Understanding denial of service
  • Using Python to test denial of service
2. Infrastructure Denial of Service
  • TCP SYN flooding using hping3
  • Using Hyena to run a reflection attack
  • UDP flooding with LOIC
  • ARP poisoning with Ettercap
  • Using NTP to amplify attacks
  • NEW: Amplification using memcached
  • NEW: When is a DDoS not a DDoS?
3. Wireless Denial of Service
  • Deauthenticating a wireless host
4. Application Denial of Service
  • Flooding HTTP using GoldenEye
  • Testing webapps using OWASP SwitchBlade
  • Understanding BlackEnergy
  • Killing the FTP service
  • RangeAmp attacks on the CDN
5. SIP Service Attacks
  • Flooding a SIP server
6. Ransomware
  • Explaining ransomware
  • Understanding Cryptolocker
  • Understanding Petya
7. Mitigation Techniques
  • Defeating denial-of-service attacks
  • Commercial anti-DOS services
  • Detecting P2P attacks with PeerShark
  • NIST guidance on mitigating DDOS
  • Considering IoT denial
Conclusion
  • Summary

Taught by

Malcolm Shore

Related Courses

Reviews

Start your review of Ethical Hacking: Denial of Service

Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free