• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Distributed Denial Of Service Ddos Attacks
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.
    Earn career credentials while taking courses that count towards your Master’s degree.
    Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.
    Complete graduate-level learning without committing to a full degree program.
    Earn a university-issued career credential in a flexible, interactive format.
    Graduate level learning within reach.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "distributed denial-of-service (ddos) attacks"

    • Status: Free Trial
      Free Trial
      J

      Johns Hopkins University

      Advanced Malware and Network Anomaly Detection

      Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows

      4.5
      Rating, 4.5 out of 5 stars
      ·
      13 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Secure Networked System with Firewall and IDS

      Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Network Monitoring, Threat Detection, Linux Administration, Linux

      4
      Rating, 4 out of 5 stars
      ·
      60 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      R

      Royal Holloway, University of London

      Cybercrime

      Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Security Awareness, Social Sciences, Culture, Psychology, Survey Creation, Research

      4.6
      Rating, 4.6 out of 5 stars
      ·
      36 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      C

      Coursera Instructor Network

      Introduction to Prompt Injection Vulnerabilities

      Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Attacks, Threat Modeling, Cyber Security Assessment, Risk Analysis, Vulnerability Assessments, Network Security, Security Strategy, Risk Mitigation

      3.8
      Rating, 3.8 out of 5 stars
      ·
      18 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      J

      Johns Hopkins University

      Introduction to Intrusion Detection Systems (IDS)

      Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado Boulder

      Security & Ethical Hacking: Attacking Unix and Windows

      Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture

      Build toward a degree

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      N

      New York University

      Enterprise and Infrastructure Security

      Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity

      4.7
      Rating, 4.7 out of 5 stars
      ·
      661 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      I

      Infosec

      Technical Deep Dive with Incident Response Tools

      Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Exploitation techniques, Malware Protection, Vulnerability Assessments, Operating Systems

      4.8
      Rating, 4.8 out of 5 stars
      ·
      88 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      I

      Illinois Tech

      Introduction to Data Networks and the Internet - Master's

      Skills you'll gain: Network Security, Network Troubleshooting, Software-Defined Networking, Network Monitoring, TCP/IP, Network Architecture, Computer Networking, Network Performance Management, Network Protocols, General Networking, Cybersecurity, Network Infrastructure, Local Area Networks, Network Analysis, OSI Models, Network Routing, Network Switches

      Build toward a degree

      4.6
      Rating, 4.6 out of 5 stars
      ·
      11 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Cloud Computing Security

      Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Cloud Security, Load Balancing, User Accounts, Apache, Web Servers, System Configuration, Command-Line Interface, Firewall, Linux, Debugging

      4.5
      Rating, 4.5 out of 5 stars
      ·
      131 reviews

      Beginner · Course · 1 - 4 Weeks

    • P

      Packt

      Learn Man in the Middle Attacks from Scratch

      Skills you'll gain: Penetration Testing, Exploitation techniques, Network Security, Intrusion Detection and Prevention, Threat Detection, General Networking, Vulnerability Management, Linux, Linux Administration, Virtual Machines, Network Analysis

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      L

      LearnKartS

      Advanced Cybersecurity

      Skills you'll gain: Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Penetration Testing, Cloud Computing, Mobile Security, Application Security, Exploit development, Virtualization, Encryption, Cryptography, Vulnerability Scanning, SQL

      4.7
      Rating, 4.7 out of 5 stars
      ·
      45 reviews

      Intermediate · Course · 1 - 4 Weeks

    1…456…834

    In summary, here are 10 of our most popular distributed denial-of-service (ddos) attacks courses

    • Advanced Malware and Network Anomaly Detection: Johns Hopkins University
    • Secure Networked System with Firewall and IDS: University of Colorado System
    • Cybercrime: Royal Holloway, University of London
    • Introduction to Prompt Injection Vulnerabilities: Coursera Instructor Network
    • Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University
    • Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
    • Enterprise and Infrastructure Security: New York University
    • Technical Deep Dive with Incident Response Tools: Infosec
    • Introduction to Data Networks and the Internet - Master's: Illinois Tech
    • Cloud Computing Security: University of Colorado System

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok