Acerca de este Curso
4.5
6 calificaciones
2 revisiones
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Horas para completar

Aprox. 11 horas para completar

Sugerido: 7 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English)
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Horas para completar

Aprox. 11 horas para completar

Sugerido: 7 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
Horas para completar
4 horas para completar

DDoS Attacks

In this MOOC, you will learn the history of DDoS attacks, get an in-depth look at the characteristics new Mirai IoT Malware attack. You will know how to analyze the Mirai source code and understand its design and implementation details. You will also see how forensic evidences pointed where it was designed. By the end of the course, you are able to take a new DDoS malware and perform detailed analysis and collect forensic evidences. ...
Reading
4 videos (Total 30 minutos), 4 readings, 3 quizzes
Video4 videos
History of DDoS7m
Mirai DDoS Attacks10m
Mirai Source Code Analysis9m
Reading4 lecturas
DDoS Attack Cases30m
History of DDoS: from digital civil disobedience to online censorship26m
Breaking Down Mirai: An IoT DDoS Botnet Analysis40m
Mirai Source Code Analysis10m
Quiz3 ejercicios de práctica
Practice Quiz 2.1.2. Mirai DDoS Characteristics10m
Practice Quiz 2.1.3 . Mirai Malware Analysis10m
Quiz 2.1 History of DDoS Attacks30m
Semana
2
Horas para completar
3 horas para completar

DDoS Defenses

In this module, you will be provided a brief overview of Basic DDoS Defense techniques. By the end of this course, you should be able to deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks....
Reading
3 videos (Total 21 minutos), 3 readings, 4 quizzes
Video3 videos
Major DDoS Defense Techniques6m
Intrusion Response and Intrusion Tolerance6m
Reading3 lecturas
Technical overview of DDoS and mitigation techniques54m
Survey of Major Techniques in DDoS Defense45m
Intrusion Tolerance Literature15m
Quiz4 ejercicios de práctica
Practice Quiz 2.2.1. Challenges in DDoS Defense8m
Practice Quiz. 2.2.2. Unsupervised Anomaly-based Malware Detection Techniques16m
Practice Quiz. 2.2.3 Intrusion Tolerance Autonomic Response Systems8m
Quiz: DDoS Defenses 2.2.20m
Semana
3
Horas para completar
3 horas para completar

DDoS Defense Systems and Techniques

In this module, you learn an Autonomous Anti-DDoS Network called A2D2 suitable for small/medium size business to deal DDoS defense. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn how to analyze effectiveness of these different defense mechanisms. By the end of this course, you should be able to deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks. ...
Reading
2 videos (Total 22 minutos), 2 readings, 3 quizzes
Video2 videos
Performance of CBQ/Rate Limit on DDoS Traffic7m
Reading2 lecturas
A2D2 Design and Implementation,m
A2D2 DDoS Defense Experiments10m
Quiz3 ejercicios de práctica
Practice Quiz. 2.3.120m
Practice Quiz: 2.3.2 DDoS Impact Analysis12m
Exam 2.3 DDoS Defense Systems and Techniques30m
Semana
4
Horas para completar
3 horas para completar

Intrusion Tolerance with Proxy-based Multipath Routing

In this module you learn a new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. You learn the development of such new security mechanism also improves the performance and reliability of the system, and does not have to be just an overhead....
Reading
2 videos (Total 21 minutos), 3 readings, 3 quizzes
Video2 videos
SCOLD Features and Benefits7m
Reading3 lecturas
Intrusion Tolerant Architecture15m
Intrusion-Tolerant Eclipse SCADA16m
On proxy server based multipath connection5m
Quiz3 ejercicios de práctica
Practice Quiz 2.4.1.16m
Practice Quiz. 2.4.28m
Quiz 2.4 Intrusion Tolerance30m
4.5
2 revisionesChevron Right

Principales revisiones

por KKNov 18th 2018

It is a very interesting course. Although most of the materials are quite old, surprisingly, they are still valid. The information is practical and detailed. You can check the Linux commands yourself.

Instructor

Avatar

Edward Chow

Professor
Computer Science

Acerca de University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando compras un Certificado, obtienes acceso a todos los materiales del curso, incluidas las tareas calificadas. Una vez que completes el curso, se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes participar del curso como oyente sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.