Denial of Service and Session Hacking

This course is included in our On-demand training solution.

Overview

Denial of Service and Distributed Denial of Service attacks are common methods used by hackers to disrupt service to networks and to corporate environments. Session hijacking is used by hackers as a method to take over sessions after a user has successfully authenticated with a server. This course examines how DoS and DDoS attacks, along with Bots and Botnets, disrupt corporate environments. And it examines session hijacking and the methods that are used to both accomplish it, and to prevent it. This course also assists students who are preparing for the EC Council’s Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience

Existing or in-training IT security professionals seeking detailed security penetration testing skills

Prerequisites

A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration

90 min.

Course Objectives

DoS and DDoS

  • categorize some typical DoS attacks
  • recognize how DDoS works
  • recognize how to use defense in depth to prevent DoS
  • Bots and Botnets

  • sequence the stages of a botnet attack
  • recognize how to defend computers from bots
  • Countering DoS and DDoS Attacks

    Introduction to Session Hijacking

  • identify how session hijackers can close a client’s session with a server and impersonate the client
  • recognize the functions of the TCP/IP layers
  • Session Hijacking Steps and Countermeasures

  • sequence the session hijacking steps
  • recognize how to defend against session hijacking
  • Session Hijacking: Key Concepts

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?