Posted on
in Presentations
Despite investment in DDoS mitigation, testing solutions is seldom on the agenda of most vulnerability management programs that focus on vulnerability scanning and pen testing. This three-hour lab will deliver an effective approach to validate your defenses against all forms of DDoS including the ability to simulate attacks, measure your response and determine if your operational practices are working.
Learning Objectives:
1: Characterize environment. Threat modelling, target identification, attack vector selection. Cloud and on-prem.
2: Test execution. Simulate all forms of DDoS attacks, set metrics and thresholds, observe operational response.
3: Improvements. Simple, no-cost or low-cost measures to rapidly build resilience and RoI on existing technology.
Learning Objectives:
1: Characterize environment. Threat modelling, target identification, attack vector selection. Cloud and on-prem.
2: Test execution. Simulate all forms of DDoS attacks, set metrics and thresholds, observe operational response.
3: Improvements. Simple, no-cost or low-cost measures to rapidly build resilience and RoI on existing technology.
Share With Your Community