Ethical Hacking (Pre-Registrations)

Ethical Hacking (Pre-Registrations)

Courses Info

Introduction

DOS is an attack used to deny legitimate users access to a resource such as accessing a website, network, emails, etc. or making it extremely slow. DoS is the acronym for Denial of Service. This type of attack is usually implemented by hitting the target resource such as a web server with too many requests at the same time. This results in the server failing to respond to all the requests. The effect of this can either be crashing the servers or slowing them down. Cutting off some business from the internet can lead to significant loss of business or money. The internet and computer networks power a lot of businesses. Some organizations such as payment gateways, e-commerce sites entirely depend on the internet to do business. In this Course, we will introduce you to what denial of service attack is, how it is performed, Analysis and how you can protect against such attacks.

About Onajah.com

  • From Basic to Advanced: Onajah education and training services are tailored to the audience and the goals of the customer. This might include basic DDoS information suitable for briefing business leaders and executives on the business risks of DDoS attacks, or a deeply technical course for engineers interested in the inner workings of DDoS attacks.

  • Practicals and Labs: The Onajah platform allows students to see real-world DDoS attacks under the guidance of a DDoS expert.

  • Interactive: Onajah instructors encourage an interactive approach to training with troubleshooting exercises and active Q&A sessions designed to stimulate interest.

  • Dedicated DDoS Expert: Education and training courses are lead by DDoS experts that have real-world experience in DDoS attacks. These experts are well versed in writing DDoS attack software, and have extensive experience in helping organizations defend themselves against attacks.

Course Pre-Requirements

  • For network-related vectors: Basic knowledge on popular network protocols on different layers (IP, ICMP, TCP, UDP etc.)

  • For network-related vectors: good understand of TCP and IP headers

  • For Web-related vectors: Good understanding of HTTP and basic knowledge on other Web protocols

  • Some experience with Wireshark would be useful

Who this course is for

  • Network Engineers

  • Web administrators

  • Penetration Testers

  • IT Security Specialists

  • Anybody who wants to learn DDoS!

Approximated Time Duration 

  • 4 Hours w.r.t +- 30min

Course Outline

  1. Introduction to DoS & DDoS

    1. Dos/DDOS Concept Understanding

    2. Case study

    3. Latest Trends

    4. Categories of Dos and DDOs Attacks

    5. Quiz

  2. Understand multiple attacking techniques

    1. Top 5 Techniques for Real Life Attacks

    2. Quiz

  3. Understand the latest strategies

    1. Multi Layer Attacks

    2. Layer 2 Attacks

    3. Layer 3 Attacks

    4. Layer 7 Attacks

    5. Quiz

  4. Understand botnet networks

    1. Criminal Organization Chart and Understanding

    2. Types of Botnet Attacks

    3. Ecosystem of Botnet

    4. Top 10 Botnets used in Dos and DDos attacks

    5. Botnet Frameworks Understanding

    6. Quiz

  5. Implement windows based Dos and DDos Attacking tools

    1. Top 15 Attacking Tools

    2. Quiz

  6. Implement Linux based Dos and DDOS Attacking tools

    1. Top 10 Attacking Tools In Kali Linux

    2. Understand Multiple Dos and DDos Attacking Frameworks

    3. Understand Advance Searching Methods for Dos and DDos Attacks

    4. Quiz

  7. Implement Android based Dos and DDos Attacking tools

    1. Top 10 Attacking Tools

    2. Quiz

  8. Understand multiple Methods and Techniques to analysis and successful detection of Real life Dos and DDos Attacks

    1. Top 3 Detection and Analysis Techniques

    2. Quiz

  9. Implement Dos and DDos Protection methods

    1. Understanding of DDos Protection Methods and Techniques

    2. Top 10 Tools used to Prevent Dos and DDos Attacks

    3. Hardware based protection Devices

    4. Quiz

  10. Understand Dos and DDos Countermeasures

    1. Understanding to Dos and DDos Attack Penetration Report

    2. Job Opportunities and Mitigations 

Courses syllabus
title Video Duration status
Comments
  • REPLY

    Please teach me ethic hacking or what it is!! Can you teach me on android? Please! i want to learn if you teach me pleaze i shall not disappoint you Thanks!!

Leave a comment