Certified Ethical Hacker (CEH) v8: Denial of Service and Session Hijacking

This course is included in our On-demand training solution.


Denial-of-service attacks reduce, restrict or prevent legitimate use of a computer’s resources. Session hijacking is an attack where an attacker takes over a valid computer session between two computers. In this course, we look at denial of service and session hijacking attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the ninth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.

Target Audience

Network and information security professionals



Expected Duration

60 min.

Course Objectives

Denial of Service Overview

  • identify permanent denial-of-service attacks
  • DoS and DDoS

  • identify hardware botnet tools
  • DoS Detection, Protection, and Penetration Testing

  • identify which type of filtering defends against botnets and DDoS
  • Session Hijacking Overview

  • match the type of session hijacking attack to its characteristics
  • Application-Level and Network-Level Session Hijacking

  • identify application-level hijacking attacks
  • Session Hijacking Countermeasures and Pen Testing

  • identify true statements about IPSec
  • Denial-of-Service and Session Hijacking Attacks





    Multi-license discounts available for Annual and Monthly subscriptions.