How to Design and Operate a DDOS Testing Program


Posted on in Presentations

Despite investment in DDoS mitigation, testing solutions is seldom on the agenda of most vulnerability management programs that focus on vulnerability scanning and pen testing. This three-hour lab will deliver an effective approach to validate your defenses against all forms of DDoS including the ability to simulate attacks, measure your response and determine if your operational practices are working.

Learning Objectives:
1: Characterize environment. Threat modelling, target identification, attack vector selection. Cloud and on-prem.
2: Test execution. Simulate all forms of DDoS attacks, set metrics and thresholds, observe operational response.
3: Improvements. Simple, no-cost or low-cost measures to rapidly build resilience and RoI on existing technology.
Participants
Sharjil Khan

Participant

Principal Consultant, Redwolf Security Inc

James Mal

Participant

Director, Sales Global, Redwolf Security Inc


Share With Your Community