Warning: WP Redis: Connection refused in /www/wwwroot/cmooc.com/wp-content/plugins/powered-cache/includes/dropins/redis-object-cache.php on line 1433
DDoS攻击和防御 | MOOC中国 - 慕课改变你,你改变世界

DDoS攻击和防御

DDoS Attacks and Defenses

1880 次查看
科罗拉多大学系统
Coursera
  • 完成时间大约为 9 个小时
  • 初级
  • 英语
注:本课程由Coursera和Linkshare共同提供,因开课平台的各种因素变化,以上开课日期仅供参考

课程概况

In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks.

For the pre-requisites, we recommend the learners take the Design and Analyze Secure Networked Systems course to learn the basic security concepts and principles and take the Secure Networked System with Firewall and IDS courses to learn the basic firewall and IDS systems.

课程大纲

DDoS Attacks

In this MOOC, you will learn the history of DDoS attacks, get an in-depth look at the characteristics new Mirai IoT Malware attack. You will know how to analyze the Mirai source code and understand its design and implementation details. You will also see how forensic evidences pointed where it was designed. By the end of the course, you are able to take a new DDoS malware and perform detailed analysis and collect forensic evidences.

DDoS Defenses

In this module, you will be provided a brief overview of Basic DDoS Defense techniques. By the end of this course, you should be able to deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks.

DDoS Defense Systems and Techniques

In this module, you learn an Autonomous Anti-DDoS Network called A2D2 suitable for small/medium size business to deal DDoS defense. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn how to analyze effectiveness of these different defense mechanisms. By the end of this course, you should be able to deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks.

Intrusion Tolerance with Proxy-based Multipath Routing

In this module you learn a new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. You learn the development of such new security mechanism also improves the performance and reliability of the system, and does not have to be just an overhead.

千万首歌曲。全无广告干扰。
此外,您还能在所有设备上欣赏您的整个音乐资料库。免费畅听 3 个月,之后每月只需 ¥10.00。
Apple 广告
声明:MOOC中国十分重视知识产权问题,我们发布之课程均源自下列机构,版权均归其所有,本站仅作报道收录并尊重其著作权益。感谢他们对MOOC事业做出的贡献!
  • Coursera
  • edX
  • OpenLearning
  • FutureLearn
  • iversity
  • Udacity
  • NovoEd
  • Canvas
  • Open2Study
  • Google
  • ewant
  • FUN
  • IOC-Athlete-MOOC
  • World-Science-U
  • Codecademy
  • CourseSites
  • opencourseworld
  • ShareCourse
  • gacco
  • MiriadaX
  • JANUX
  • openhpi
  • Stanford-Open-Edx
  • 网易云课堂
  • 中国大学MOOC
  • 学堂在线
  • 顶你学堂
  • 华文慕课
  • 好大学在线CnMooc
  • (部分课程由Coursera、Udemy、Linkshare共同提供)

© 2008-2022 CMOOC.COM 慕课改变你,你改变世界