Denial of Service and Session Hacking


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Denial of Service and Distributed Denial of Service attacks are common methods used by hackers to disrupt service to networks and to corporate environments. Session hijacking is used by hackers as a method to take over sessions after a user has successfully authenticated with a server. This course examines how DoS and DDoS attacks, along with Bots and Botnets, disrupt corporate environments. And it examines session hijacking and the methods that are used to both accomplish it, and to prevent it. This course also assists students who are preparing for the EC Council's Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience
Existing or in-training IT security professionals seeking detailed security penetration testing skills

Prerequisites
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration (hours)
1.5

Lesson Objectives

Denial of Service and Session Hacking

  • categorize some typical DoS attacks
  • recognize how DDoS works
  • recognize how to use defense in depth to prevent DoS
  • sequence the stages of a botnet attack
  • recognize how to defend computers from bots
  • recognize how DoS and DDoS attacks work and how to counter them
  • identify how session hijackers can close a client's session with a server and impersonate the client
  • recognize the functions of the TCP/IP layers
  • sequence the session hijacking steps
  • recognize how to defend against session hijacking
  • recognize how session hijacking works and how it can be countered
  • Course Number:
    sp_etih_a06_it_enus