RCCE Course
Course #352

DDoS Troubleshooting

📊 Level: Beginner
⏱️ Duration: 2 Days
🏷️ Track: Network Security
📋 Prerequisites: None
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn distributed denial of service attack types, detection, and mitigation including volumetric attacks, protocol attacks, application-layer attacks, and DDoS response procedures. RCCE students will learn to classify DDoS attack types by vector and layer, implement DDoS mitigation architectures using CDNs, scrubbing centers, and cloud-based protection services, configure rate limiting and traffic shaping, detect DDoS attacks through traffic analysis and anomaly detection, execute DDoS response procedures during active attacks, conduct post-attack analysis, and design resilient architectures that maintain availability during DDoS campaigns. This diagnostic course focuses on identifying, analyzing, and resolving common failures, misconfigurations, and operational issues. Starting from foundational concepts, RCCE students will learn systematic troubleshooting methodologies that accelerate root-cause analysis and minimize downtime. Students work through realistic break-fix scenarios that build the diagnostic confidence needed for high-pressure production environments.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing DDoS Troubleshooting
🧠 What You Will Learn
  • Explain Module Overview fundamentals
  • Design a scalable privilege management architecture with policy and enforcement, including Detection Methods.
  • Execute hands-on tasks for learning objectives — covering Identify attack vectors by layer, Distinguish volumetric vs protocol vs app.
  • Execute hands-on tasks for implement mitigation — covering Deploy CDN-based protections, scrubbing center routing.
  • Execute hands-on tasks for classify ddos attacks — covering Identify attack vectors by layer, Distinguish volumetric vs protocol vs app.
  • Execute hands-on tasks for deploy cdn-based protections — covering scrubbing center routing.
  • Execute hands-on tasks for configure defenses — covering rate limiting rules, Apply traffic shaping policies.
  • Execute hands-on tasks for detect and respond — covering Analyze traffic for anomalies, Execute IR playbooks under pressure.
  • Execute hands-on tasks for what is a ddos attack? — covering Distributed Denial of Service overwhelms targets.
  • Execute hands-on tasks for dos (denial of service) — covering Single-source attack.
  • Execute hands-on tasks for ddos (distributed dos) — covering Multi-source via botnet.
  • Execute hands-on tasks for volumetric attacks (l3/l4)
📚 Course Outline
Module 01Module Overview
Module 02Mitigation Architectures
Module 03Learning Objectives
Module 04Implement Mitigation
Module 05Classify DDoS Attacks
Module 06Deploy CDN-based protections
Module 07Configure Defenses
Module 08Detect and Respond
Module 09What is a DDoS Attack?
Module 10DoS (Denial of Service)
Module 11DDoS (Distributed DoS)
Module 12Volumetric Attacks (L3/L4)
Module 13Protocol Attacks (L3/L4)
Module 14Application Layer (L7)
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice ddos troubleshooting by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Explain Module Overview fundamentals
  • Lab 2: Design a scalable privilege management architecture with policy and enforcement
  • Lab 3: Execute hands-on tasks for learning objectives
  • Lab 4: Execute hands-on tasks for implement mitigation
  • Lab 5: Execute hands-on tasks for classify ddos attacks
📊 Skill Level
Beginner
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for DDoS Troubleshooting, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI