RiseUpp Logo
Educator Logo

DDoS Attacks and Defenses

This course is part of Advanced System Security Design.

This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Advanced System Security Design Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.

4.5

(157 ratings)

9,492 already enrolled

Instructors:

English

Powered by

Provider Logo
DDoS Attacks and Defenses

This course includes

15 Hours

Of Self-paced video lessons

Beginner Level

Completion Certificate

awarded on course completion

Free course

What you'll learn

  • Analyze and understand DDoS attack characteristics and evolution

  • Master Mirai IoT malware analysis and forensics

  • Implement effective DDoS defense mechanisms

  • Deploy Linux firewall features and rate limiting

  • Develop autonomous anti-DDoS networks

Skills you'll gain

DDoS Defense
Network Security
Malware Analysis
Mirai IoT
Intrusion Tolerance
Firewall Configuration
Linux Security
Network Forensics
Traffic Analysis
Security Architecture

This course includes:

1.5 Hours PreRecorded video

13 assignments

Access on Mobile, Tablet, Desktop

FullTime access

Shareable certificate

Closed caption

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

There are 4 modules in this course

This comprehensive course covers DDoS attacks and defense mechanisms, focusing on both theoretical understanding and practical implementation. Students learn about the history of DDoS attacks, analyze the Mirai IoT Malware, and study various defense techniques. The curriculum includes hands-on experience with the Autonomous Anti-DDoS Network (A2D2) and explores intrusion tolerance using proxy-based multipath routing. Special emphasis is placed on real-world applications for small/medium organizations.

DDoS Attacks

Module 1 · 4 Hours to complete

DDoS Defenses

Module 2 · 4 Hours to complete

DDoS Defense Systems and Techniques

Module 3 · 3 Hours to complete

Intrusion Tolerance with Proxy-based Multipath Routing

Module 4 · 3 Hours to complete

Fee Structure

Individual course purchase is not available - to enroll in this course with a certificate, you need to purchase the complete Professional Certificate Course. For enrollment and detailed fee structure, visit the following: Advanced System Security Design

Instructor

Edward Chow
Edward Chow

4.3 rating

98 Reviews

1,23,746 Students

8 Courses

Distinguished Expert in Cybersecurity and Network Systems

Edward Chow serves as Professor of Computer Science at the University of Colorado Colorado Springs, bringing over three decades of expertise in network security and system design. After earning his Ph.D. from the University of Texas at Austin in 1985, he worked at Bell Communications Research before joining UCCS in 1991. His research focuses on improving security, reliability, and performance of network systems, leading to two US patents in distributed network restoration and survivable architecture. On Coursera, he leads the Advanced System Security Design Specialization, which has attracted over 9,207 students, teaching courses in cloud computing security, TOR networks, and DDoS defense. His recent innovations include developing efficient Internet Security protocols for online storage systems and creating secure information sharing systems using attribute certificates. His current work involves Software Defined Networks for defending against DDoS attacks and enhancing data security through right path right place data delivery (R2D2). His contributions extend to assistive technologies, combining Laban dance notation with wireless sensor-based human motion tracking systems for rehabilitation care.

DDoS Attacks and Defenses

This course includes

15 Hours

Of Self-paced video lessons

Beginner Level

Completion Certificate

awarded on course completion

Free course

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.