Networking / Wireless Security All About DDoS Attacks - Become a DDoS Guru! Complete Course [English]

Joined
Aug 12, 2022
Messages
159
Location
Denmark
Hellcoins
♆1,153
Username Style (Gradient Colours)
| All About DDoS Attacks - Become a DDoS Guru!.7z
|
+---1. Introduction
| 0.Introduction.mp4
| 1. Course Outline.mp4
| 1. Course Outline.srt
| 2. Closed (Private) Facebook Group.html
|
+---10. TCP-IP Model Application Layer DNS
| 1. DNS Attack Vector #1.mp4
| 1. DNS Attack Vector #1.srt
| 1.1 DNS challenge resource.html
| 2. DNS Attack Vector #2.mp4
| 2. DNS Attack Vector #2.srt
| 2.1 A good watch on the power of this vector!.html
|
+---11. TCP-IP Model Application Layer Remaining Protocols
| 1. Attack Vector #1-4.mp4
| 1. Attack Vector #1-4.srt
| 2. Attack Vector #5.mp4
| 2. Attack Vector #5.srt
|
+---12. Protection&Mitigation
| 1. Overview.mp4
| 1. Overview.srt
| 2. Proper Firewall Configuration.mp4
| 2. Proper Firewall Configuration.srt
| 3. Rate Controls.mp4
| 3. Rate Controls.srt
| 4. Proper Load Balancer and Router Configuration.mp4
| 4. Proper Load Balancer and Router Configuration.srt
| 4.1 Good Guide from Cisco for Routers.html
| 5. Testing your websites andor Web services against DDoS.html
|
+---13. Protection with CDNs
| 1. What is a CDN.mp4
| 1. What is a CDN.srt
| 2. Does CDN protect you against DDoS.mp4
| 2. Does CDN protect you against DDoS.srt
| 3. Important Things to Consider Deploying a CDN Solution.mp4
| 3. Important Things to Consider Deploying a CDN Solution.srt
|
+---14. Conclusion
| 1. Bonus Lecture.mp4
| 1. Bonus Lecture.srt
|
+---2. Definitions
| 1. Definitions and Differences.mp4
| 1. Definitions and Differences.srt
|
+---3. TCP-IP Model Physical&Data Link (Network Access) Layer
| 1. TCPIP Model Physical&Data Link (Network Access) Layer.mp4
| 1. TCPIP Model Physical&Data Link (Network Access) Layer.srt
|
+---4. TCP-IP Model Internet (Network) Layer
| 1. Overview.mp4
| 1. Overview.srt
| 2. Attack Vector #1.mp4
| 2. Attack Vector #1.srt
| 3. Attack Vector #2.mp4
| 3. Attack Vector #2.srt
|
+---5. TCP-IP Model Transport Layer
| 1. Overview.mp4
| 1. Overview.srt
|
+---6. TCP-IP Model Transport Layer TCP
| 1. TCP Attack Vector #1.mp4
| 1. TCP Attack Vector #1.srt
| 2. TCP Attack Vector #1 Response Challenges.mp4
| 2. TCP Attack Vector #1 Response Challenges.srt
| 3. TCP Attack Vector #2.mp4
| 3. TCP Attack Vector #2.srt
| 4. TCP Attack Vector #3 and Combinations.mp4
| 4. TCP Attack Vector #3 and Combinations.srt
| 5. TCP Attack Vector #4.mp4
| 5. TCP Attack Vector #4.srt
| 6. TCP Attack Vector #5.mp4
| 6. TCP Attack Vector #5.srt
|
+---7. TCP-IP Model Transport Layer UDP
| 1. UDP Attack Vector #1.mp4
| 1. UDP Attack Vector #1.srt
| 2. UDP Attack Vector #2.html
| 3. A shady method to block IP-based attacks (e.g. TCP, UDP).html
|
+---8. TCP-IP Model Application Layer
| 1. Overview.mp4
| 1. Overview.srt
|
\---9. TCP-IP Model Application Layer Web
1. Web Attack Vector #1.mp4
1. Web Attack Vector #1.srt
2. Web Attack Vector #1 Response Challenges.mp4
2. Web Attack Vector #1 Response Challenges.srt
3. A brief note.html
4. Web Attack Vector #2.mp4
4. Web Attack Vector #2.srt
4.1 Configurations per WebApp.html

Watch Online On Mega
You must reply before you can see the hidden data contained here.
 
Top