Distributed Denial-Of-Service (DDoS) Attacks

Distributed Denial-of-Service (DDoS) attacks are malicious attempts to disrupt the normal functioning of a network, service, or website by overwhelming it with a flood of internet traffic. Coursera's DDoS attacks catalogue teaches you about the methods and mechanisms behind these attacks, helping you to understand and potentially prevent them. You'll learn about different types of DDoS attacks, how they are carried out, and what countermeasures can be employed to mitigate their impact. You'll also gain an understanding of network security principles and protocols, as well as techniques for monitoring and safeguarding digital environments against such threats.
26credentials
57courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "distributed denial-of-service (ddos) attacks"

  • Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Cloud Infrastructure, Load Balancing, Prompt Engineering, Kubernetes, Network Monitoring, Containerization, Network Architecture, Network Security, Cloud Storage, Cloud Services, Identity and Access Management, Application Deployment, Virtual Machines, Network Routing, Network Planning And Design, Virtual Private Networks (VPN), Cloud Computing, Hybrid Cloud Computing

  • Status: Free Trial

    Skills you'll gain: Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Security Testing, Authorization (Computing), Authentications, Data Validation, Encryption, Security Software, Data Security, Vulnerability Scanning, Security Controls, Role-Based Access Control (RBAC), Verification And Validation, Security Awareness, Cybersecurity, User Accounts, Configuration Management, Web Applications, Web Development Tools

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Troubleshooting, Proxy Servers, Network Monitoring, Network Administration, Cloud Security, Intrusion Detection and Prevention, Firewall, Google Cloud Platform, Threat Detection, Hardening, Identity and Access Management

  • Status: Free Trial

    New York University

    Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Threat Detection, Cyber Security Policies

  • Status: Free Trial

    Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Cloud Infrastructure, Load Balancing, System Monitoring, Prompt Engineering, Kubernetes, Network Performance Management, Network Monitoring, Firewall, Cloud Computing Architecture, Containerization, Network Architecture, Network Security, Cloud Storage, Cloud Services, Network Routing, Virtual Private Networks (VPN), Network Troubleshooting

  • Status: Free Trial

    Cisco Learning and Certifications

    Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, Network Administration, TCP/IP, Network Infrastructure, Infrastructure Security, Intrusion Detection and Prevention, Network Protocols, Load Balancing, Firewall, Vulnerability Assessments, General Networking, Authorization (Computing), Web Applications, Authentications

  • Status: Free Trial

    Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Prompt Engineering, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Role-Based Access Control (RBAC), Network Security, OAuth, Network Routing, Cloud Security, Virtual Private Networks (VPN)

  • Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Google Cloud Platform, Threat Management, Cloud Security, Threat Detection, Event Monitoring, System Monitoring, Personally Identifiable Information, Data Security, Security Management, Load Balancing, System Software

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Continuous Monitoring, Network Security, Network Monitoring, Proxy Servers, Intrusion Detection and Prevention, Threat Detection, Firewall, Google Cloud Platform, Infrastructure Security, Network Troubleshooting, Identity and Access Management

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Proxy Servers, Firewall, Identity and Access Management, Network Monitoring, Cloud Security, Google Cloud Platform, Intrusion Detection and Prevention, Threat Detection, Scalability

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Event Monitoring, Threat Detection, Continuous Monitoring, Intrusion Detection and Prevention, System Monitoring, Security Information and Event Management (SIEM), Real Time Data

  • Status: Free Trial

    Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers