- Level Foundation
- Duration 16 hours
- Course by University of Colorado System
-
Offered by
About
In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks. For the pre-requisites, we recommend the learners take the Design and Analyze Secure Networked Systems course to learn the basic security concepts and principles and take the Secure Networked System with Firewall and IDS courses to learn the basic firewall and IDS systems.Modules
Welcome to Distributed Denial of Service Course
1
Videos
- Welcome to DDoS Attack and Defense Course
2
Readings
- DDoS Attack Cases
- Get help and meet other learners in this course. Join your discussion forums!
History of DDoS Attacks
1
Discussions
- Where small businesses and individual can seek help when they are under DDoS attacks?
1
Videos
- History of DDoS
1
Readings
- History of DDoS: from digital civil disobedience to online censorship
Mirai IoT Malware Attack
1
Assignment
- Practice Quiz 2.1.2. Mirai DDoS Characteristics
1
Videos
- Mirai DDoS Attacks
1
Readings
- Breaking Down Mirai: An IoT DDoS Botnet Analysis
Mirai Source Code Analysis Results
1
Assignment
- Practice Quiz 2.1.3 . Mirai Malware Analysis
1
Discussions
- Why not shutdown the C&C servers of Mirai malware?
1
Videos
- Mirai Source Code Analysis
1
Readings
- Mirai Source Code Analysis
Exam 2.1
1
Assignment
- Quiz 2.1 History of DDoS Attacks
DDoS Defenses Challenges and the Appaches
1
Assignment
- Practice Quiz 2.2.1. Challenges in DDoS Defense
1
Videos
- DDoS Defense Challenges and the Approaches
1
Readings
- Technical overview of DDoS and mitigation techniques
Major DDoS Defense Techniques
1
Assignment
- Practice Quiz. 2.2.2. Unsupervised Anomaly-based Malware Detection Techniques
1
Discussions
- How to Improve DDoS Defense?
1
Videos
- Major DDoS Defense Techniques
1
Readings
- Survey of Major Techniques in DDoS Defense
Intrusion Response and Intrusion Tolerance
1
Assignment
- Practice Quiz. 2.2.3 Intrusion Tolerance Autonomic Response Systems
1
Videos
- Intrusion Response and Intrusion Tolerance
1
Readings
- Intrusion Tolerance Literature
Exam 2.2.
1
Assignment
- Quiz: DDoS Defenses 2.2.
Autonomous Anti-DDoS Network (A2D2)
1
Assignment
- Practice Quiz. 2.3.1
1
Videos
- Autonomous Anti-DDoS Network
1
Readings
- A2D2 Design and Implementation,
Performance of CBQ/Rate Limit on DDoS Traffic Types
1
Assignment
- Practice Quiz: 2.3.2 DDoS Impact Analysis
1
Discussions
- How can A2D2 be scaled up?
1
Videos
- Performance of CBQ/Rate Limit on DDoS Traffic
1
Readings
- A2D2 DDoS Defense Experiments
Exam 2.3
1
Assignment
- Exam 2.3 DDoS Defense Systems and Techniques
SCOLD: An Intrusion Tolerance Implementation
1
Assignment
- Practice Quiz 2.4.1.
1
Videos
- SCOLD: An Intrusion Tolerance Implementation
2
Readings
- Intrusion Tolerant Architecture
- Intrusion-Tolerant Eclipse SCADA
Scold Features and Benefits
1
Assignment
- Practice Quiz. 2.4.2
1
Discussions
- What are weakest point of the proposed proxy based multipath routing scheme?
1
Videos
- SCOLD Features and Benefits
1
Readings
- On proxy server based multipath connection
Exam 2.4
1
Assignment
- Quiz 2.4 Intrusion Tolerance
Auto Summary
Explore the world of DDoS Attacks and Defenses in this comprehensive IT & Computer Science course. Led by Coursera, you'll delve into the history and analysis of Mirai IoT Malware, learn advanced defense techniques, and develop an Autonomous Anti-DDoS Network (A2D2). Ideal for those with foundational knowledge in secure networked systems, this course spans 960 minutes and offers a starter subscription. Enhance your skills in malware analysis, forensic evidence collection, firewall deployment, and future DDoS strategy development. Perfect for IT professionals and cybersecurity enthusiasts aiming to bolster their defense capabilities.

Edward Chow