Distributed Denial-Of-Service (DDoS) Attacks

Distributed Denial-of-Service (DDoS) attacks are malicious attempts to disrupt the normal functioning of a network, service, or website by overwhelming it with a flood of internet traffic. Coursera's DDoS attacks catalogue teaches you about the methods and mechanisms behind these attacks, helping you to understand and potentially prevent them. You'll learn about different types of DDoS attacks, how they are carried out, and what countermeasures can be employed to mitigate their impact. You'll also gain an understanding of network security principles and protocols, as well as techniques for monitoring and safeguarding digital environments against such threats.
28credentials
64courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "distributed denial-of-service (ddos) attacks"

  • Status: Free Trial

    Cisco Learning and Certifications

    Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, Network Administration, TCP/IP, Network Infrastructure, Infrastructure Security, Intrusion Detection and Prevention, Network Protocols, Load Balancing, Firewall, Vulnerability Assessments, General Networking, Authorization (Computing), Web Applications, Authentications

  • Status: Free Trial

    Skills you'll gain: Cloud Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Artificial Intelligence and Machine Learning (AI/ML), Digital Transformation, Site Reliability Engineering, Google Cloud Platform, Cloud Infrastructure, Data Governance, Cloud Storage, Real Time Data, Cloud Services, Cost Management, Cloud Applications, Looker (Software), Data Storage, Data Security, Hybrid Cloud Computing, Application Programming Interface (API), Cloud Computing

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption

  • Status: Free Trial

    Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Distributed Denial-Of-Service (DDoS) Attacks, Data Security, Malware Protection, Email Security, Exploitation techniques, Network Security, Fraud detection, Artificial Intelligence

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Cloud Security, Wireless Networks, Application Programming Interface (API)

  • Status: Free Trial

    Skills you'll gain: Prompt Engineering, Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Infrastructure As A Service (IaaS), Generative AI, Cloud Services, Containerization, Virtual Machines, Data Loss Prevention, Cloud Storage, Application Development, Network Infrastructure, Security Management, Cloud Computing, Malware Protection, Continuous Monitoring

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis

  • Status: Free Trial

    Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols

  • Status: Free Trial

    Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Prompt Engineering, Network Monitoring, Containerization, Cloud Computing Architecture, Network Architecture, Role-Based Access Control (RBAC), Network Security, OAuth, Network Routing, Cloud Security, Virtual Private Networks (VPN)

  • Status: Free Trial

    Skills you'll gain: Load Balancing, Hybrid Cloud Computing, Google Cloud Platform, Cloud Computing, Network Performance Management, Cloud Security, TCP/IP, Scalability, Distributed Denial-Of-Service (DDoS) Attacks

  • Status: Free Trial

    Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Security Controls, Endpoint Security, Threat Detection, Virtual Machines, Encryption, Event Management

  • Skills you'll gain: Cybersecurity, Cyber Security Assessment, Incident Response, Firewall, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Authentications, Linux Commands

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Google Cloud
  • Packt
  • University of Colorado System
  • Whizlabs
  • Johns Hopkins University
  • Microsoft
  • EDUCBA
  • Infosec