CEH v11: DoS, DDoS, Volumetric & Protocol Attacks
Ethical Hacker v11
| Intermediate
- 3 videos | 50m 9s
- Includes Assessment
- Earns a Badge
Denial of Service attacks can be very disruptive to an organization both monetarily and reputationally. In this course, you'll explore Denial of Service and Distributed Denial of Service attacks, as well as common DoS techniques and categories and common tools used to perform them. Next, you'll examine volumetric DoS attacks, which are one of the more common types deployed by attackers. These include UDP flood, Ping of Death, Smurf, and Pulse Wave. Finally, you'll learn about protocol-based DoS attacks, including SYN floods, ACK floods, and fragmentation attacks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
Identify the types of denial of service (dos) attacksidentify the tools used to perform a denial-of-service attackRecognize the different volumetric attack typesidentify a command to perform a ping of death attack
-
recognize the command to issue to perform a udp flood attackRecognize the different types of flood attacksidentify the different types of dos attacksidentify the command to perform a syn flood attack
IN THIS COURSE
-
12m 16sIn this video, you will learn how to identify the tools used to perform a denial of service attack. FREE ACCESS
-
20m 42sIn this video, find out how to identify a command to perform a ping of death attack. FREE ACCESS
-
17m 11sTo find out how to perform a SYN flood attack, identify the command. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.