Distributed Denial-Of-Service (DDoS) Attacks

Distributed Denial-of-Service (DDoS) attacks are malicious attempts to disrupt the normal functioning of a network, service, or website by overwhelming it with a flood of internet traffic. Coursera's DDoS attacks catalogue teaches you about the methods and mechanisms behind these attacks, helping you to understand and potentially prevent them. You'll learn about different types of DDoS attacks, how they are carried out, and what countermeasures can be employed to mitigate their impact. You'll also gain an understanding of network security principles and protocols, as well as techniques for monitoring and safeguarding digital environments against such threats.
27credentials
62courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "distributed denial-of-service (ddos) attacks"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Hardening, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Network Architecture, Network Security, Computer Security Incident Management, Intrusion Detection and Prevention, Incident Management, Network Protocols, Threat Detection, Event Monitoring, Threat Management, Network Infrastructure, Security Controls, Cybersecurity, System Monitoring, Operating Systems, Linux, Bash (Scripting Language), Databases

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Security Testing, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Cryptography, Cybersecurity, Vulnerability Scanning, Hardening, Threat Detection, Data Import/Export, Public Key Infrastructure, MySQL, Linux, Linux Administration

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Network Protocols

  • Status: New
    Status: Preview

    Skills you'll gain: Event Monitoring, OSI Models, Network Monitoring, Network Protocols, Cyber Threat Intelligence, Network Analysis, Network Troubleshooting, TCP/IP, Distributed Denial-Of-Service (DDoS) Attacks, Threat Detection, General Networking, Network Security, Incident Response, Command-Line Interface

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Security Assessment, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Microsoft Windows

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL

What brings you to Coursera today?

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Security Engineering, Network Security, Threat Detection, Firewall, Code Review, Network Routing, Proxy Servers, Linux, Internet Of Things

  • Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Monitoring, Firewall, Google Cloud Platform, Cloud Security, Intrusion Detection and Prevention, Identity and Access Management, Proxy Servers, Threat Detection

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Threat Detection, Application Security, Technical Communication, Infrastructure Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Payment Card Industry (PCI) Data Security Standards, Scripting, Technical Writing, NIST 800-53, Automation, Technical Consulting

  • Status: New
    Status: Free Trial

    Skills you'll gain: Responsible AI, Large Language Modeling, IT Security Architecture, Data Ethics, Threat Modeling, Vulnerability Assessments, Security Engineering, Threat Detection, Cybersecurity, Information Systems Security, Cyber Security Strategy, Security Strategy, Security Management, Artificial Intelligence, Cyber Attacks, Cloud Security, Security Awareness, Enterprise Security, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response

  • Status: New
    Status: Free Trial

    Skills you'll gain: Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Microsoft Azure, Cloud Security, Virtual Private Networks (VPN), Network Security, Vulnerability Assessments, Continuous Monitoring, Data Security, Key Management, Kubernetes, Security Controls, Hardening, Database Architecture and Administration, Authentications, Network Administration, Network Routing, Remote Access Systems, User Accounts, Authorization (Computing)

  • Status: New
    Status: Free Trial

    Skills you'll gain: Networking Hardware, Network Monitoring, OSI Models, Routing Protocols, Software-Defined Networking, Network Troubleshooting, Network Architecture, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, TCP/IP, Network Routing, Computer Networking, Open Shortest Path First (OSPF), Network Administration, Network Performance Management, Network Routers, Local Area Networks, Hardening, Intrusion Detection and Prevention