Duyuru

Privia Security was chosen as one of Türkiye's fastest growing companies!

Read the News Read the News
PRIVIA

Enterprise Training

DDoS Attacks and Mitigation Techniques Training

An up-to-date and effective corporate training program, reinforced with lab support, where you can learn the latest DDoS attack techniques and defense strategies.
DDoS Attacks and Mitigation Techniques Training

Training Location

Online/Physical

Training Duration

3 Days

Training Level

Beginner

The Power Behind Industry Leaders

About Training

DDoS Attacks and Mitigation Training is a corporate training program supported by hands-on labs, providing comprehensive knowledge on denial-of-service attack techniques and corresponding defense strategies.

 

Throughout the training, participants gain insights into critical areas such as IT configuration errors, bandwidth exploitation, and TCP/IP protocol vulnerabilities. Both Layer 7 (application layer) and Layer 4 (network layer) DoS attack methods are demonstrated in practice.

 

By the end of the course, participants will understand how DoS and DDoS attacks are executed, learn effective protection techniques, and develop a solid foundation in TCP/IP protocols and various DDoS attack types.

 

The training is conducted online with lab access between 10:00 AM and 5:00 PM on weekdays, completed over 3 days, and participants receive a wet-signed Privia Security certificate upon completion.

Prerequisites for the Training

Participants are expected to have certain foundational competencies to ensure they can fully benefit from the training:

Basic knowledge of information security
Fundamental understanding of TCP/IP protocols

Who Should Attend the Training?

Our corporate training program is designed for professionals who want to learn the most up-to-date and effective techniques against DoS and DDoS attacks:

Information security specialists
Cybersecurity professionals
System administrators
Network engineers
Digital forensics experts
Law enforcement personnel
Service provider staff
expertise

Privia Training in Numbers

Our cybersecurity training programs aim to raise organizational awareness by enhancing employees' understanding and consciousness of information security.

1200+

Hour Training

300+

Enterprise Customer

100+

Technical Publication

22.000+

Total Subscribers

eagle

Tailored Closed-Group Trainings for Enterprises

Training Content

1. Day

DoS/DDoS Attacks and Defense

  • What is IP Spoofing?

  • DoS/DDoS Concepts

  • What is a Zombie Computer?

  • Operation and Roles of a Zombie Computer

  • Countermeasures Against Zombie Computers

  • What is a Botnet?

  • Botnet Software

  • Historical Botnets and Evolution

    • Eggdrop

    • GTBot

    • Bobax

    • Rustock

    • Zeus

    • Conficker

  • IRC Bots

  • Social Media Bots

  • Mobile Botnets

    • Mobile Botnet vs PC Botnet Comparison

  • Fast Flux Network Concept

    • Single-Flux

    • Double-Flux

  • Hacktivist Groups and Their Role in DDoS

  • Real-World DDoS Examples

    • Wikileaks

2. Day

Structure and Encapsulation

Turning Points of the Internet

  • DARPA, ISO

  • ARPANET

  • INTERNET

  • TCP/IP

  • OSI Reference Model and Structure

  • TCP/IP Model and Structure

  • TCP/IP Layers

  • Data Naming in TCP/IP Layers

  • Internet Registry Authorities

  • TCP/IP Protocols and Operation Principles

Ethernet and Hardware Addressing

  • Ethernet Structure and Encapsulation

  • ARP (Address Resolution Protocol)

  • ARP Operation

  • ARP Cache

  • ARP Header Structure

  • ARP Spoofing

  • MAC Flooding

ICMP Protocol

  • ICMP Flood

IP (Internet Protocol)

  • IP Address Classes

  • IP Header Structure

TCP Header Structure

  • Acknowledgements in TCP

  • TCP Flags Concept

DHCP Starvation Attack

DoS/DDoS Attacks

  • Root Causes

  • Common Misconceptions About DDoS

  • SYN Flood

  • Backlog Queue Concept

  • How to Detect SYN Flood DDoS Attacks

  • SYN Flood Testing Using Hping

  • Countermeasures During a SYN Flood Attack

SYN Flood Defense Mechanisms

    • What is SYN Cookie?

    • Disadvantages of SYN Cookie

    • What is SYN Cache?

    • What is SYN Proxy?

    • Disadvantages of SYN Proxy

3. Day

DoS/DDoS Prevention Methods and Techniques

How HTTP Works

  • HTTP GET

  • HTTP POST

  • HTTP Flood

  • GET Flood

  • POST Flood

DoS/DDoS Attacks Due to Software or Design Flaws

  • Slowloris Tool and Usage

  • What is Rate Limiting?

UDP Protocol

  • UDP Header Structure

  • Creating UDP Packets with Hping

  • IP Spoofing at the UDP Layer

  • UDP Flood

  • UDP Flood Testing Using Hping

DoS/DDoS Attacks Targeting DNS Services

  • DNS Architecture

  • DNS Query Types

  • Recursive Query

  • Iterative Query

  • DNS Name Resolution

  • IP Spoofing in DNS Protocol

  • DNS and TCP Relationship

  • DNS Flood Attacks

  • Amplified DNS Flood Attacks

  • Detecting DNS Flood Attacks

  • Preventing DNS Flood Attacks

  • DNS Caching

  • DNS Anycast

  • Rate Limiting

  • DFAS

Other DoS Techniques

  • Teardrop Attacks

  • Ping of Death Attacks

DDoS Market and Protection Products

  • CheckPoint DDoS Protector

  • Fortinet Firewall

  • F5 DDoS Protection

DoS/DDoS Prevention Methods and Techniques

    • Router-Level Protection

    • Firewall-Level Protection

    • NIPS-Level Protection

    • Protection for Web Servers

    • Blocking DoS/DDoS with Iptables

    • Blocking Local Network DoS/DDoS Attacks

    • OpenBSD Packet Filter DDoS Protection Features

    • CDN Architecture

    • Load Balancer

    • CloudFlare

Explore our training calendar and design a program tailored to your needs!

use case image

Training Proposal Form

Meet the expert team at Privia Security and let us conduct the essential initial analysis to elevate your organization’s cybersecurity maturity.

    eagle

    Our Other Training Programs