Module 9: Denial of Service

Please purchase the course before starting the lesson.

Introduction: The availability of the applications, systems or platform are also targets for an attack, in this lesson we will talk about the different methods of denial of service most used. Learning Objectives: By the end of this lesson you should be able to: Understand the types of DoS attacks Understand how a DDoS attack [...]

Back to: Ultimate IT Security Certification Bundle > EC-Council Certified Ethical Hacker (CEHv10)