icon
Quality Score

Content Quality
/
Video Quality
/
Qualified Instructor
/
Course Pace
/
Course Depth & Coverage
/

Overall Score : 84 / 100

icon
Live Chat with CourseDuck's Co-Founder for Help

Need help deciding on a redux course? Or looking for more detail on Edward Chow's DDoS Attacks and Defenses? Feel free to chat below.
Join CourseDuck's Online Learning Discord Community

icon
Course Description

In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks. For the pre-requisites, we recommend the learners take the Design and Analyze Secure Networked Systems course to learn the basic security concepts and principles and take the Secure Networked System with Firewall and IDS courses to learn the basic firewall and IDS systems.

icon
Instructor Details

Edward Chow

Dr. Chinghua Edward Chow is Professor of Computer Science. Got his PhD in Computer Science Degree from University of Texas at Austin 1985. He served as a Member of Technical Staff with Bell Communications Research, NJ 1986-1991. He joined UCCS 1991. His research is focused on the improvement of the security, reliability and performance of network systems. He has two US patents on distributed network restoration and survivable architecture. He is currently working on techniques and risk analysis for critical infrastructure protection and data protection using proximity and network information. He recently developed an efficient Internet Security protocol that improves the performance and security of online storage systems. A secure information sharing system was developed for setting up secure information infrastructure which is based on attribute certificate to coordinate multiple agencies task forces. By enhancing Laban dance notation, deploying computer animation, and developing wireless sensor based human motion tracking system, he is developing systems for improving assistive technologies and rehab patient care. He is currently working on techniques based on Software Defined Networks (SDN) for defending Distributed Denial of Services and improving cyber resilience, and techniques for enhancing data security through right path right place data delivery (R2D2).

icon
Reviews

4.2

18 total reviews

5 star 4 star 3 star 2 star 1 star
% Complete
% Complete
% Complete
% Complete
% Complete

By Anurag V on 15-Apr-19

I am currently in college and my college doesn't have many cybersec courses. This one is great for beginners and is easy to understand if you give it time. Despite getting you used to the terminology used when handling DDoS attacks, it will teach you the methodologies used to mitigate, thwart or tolerate them. It won't teach you step-by-step how to implement those, but it isn't hard to learn it yourself if you're curious enough.

By sai p j on 18-Nov-18

It is a very interesting course. Although most of the materials are quite old, surprisingly, they are still valid. The information is practical and detailed. You can check the Linux commands yourself.

By Camilo G on 19-Apr-19

Really productive.

By Dupuy N on 16-May-19

Mr. Chow is a really good instructor. Definitely worth it.

By Jeeva V on 26-Jul-19

This course is one of the best course related to Network security. Additional resources were very useful especially the thesis about A2D2 network. Questions are also very nice and conceptual.

By Johnson J on 28-Aug-19

Need some updates with different content in the course. Really helpful to understand DDOS Attacks

By Ali A on 2-Jul-19

voice is not clear

By Siddharth S on 6-Nov-18

Please add some practical task and improve some Docs. like don't add pdf of 170+ pages no one is going to read them ,add as more as Videos

By Arun K on 5-Apr-19

unfortunately I did not understand that English dialect.It was difficult for me to understand what he was talking about. The automatic subtitle does not recognize a lot of words. Most of information in course are outdated.