RCCE Course
Course #449

DDoS Troubleshooting: In Practice

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: Network Security
📋 Prerequisites: Foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn distributed denial of service attack types, detection, and mitigation including volumetric attacks, protocol attacks, application-layer attacks, and DDoS response procedures. RCCE students will learn to classify DDoS attack types by vector and layer, implement DDoS mitigation architectures using CDNs, scrubbing centers, and cloud-based protection services, configure rate limiting and traffic shaping, detect DDoS attacks through traffic analysis and anomaly detection, execute DDoS response procedures during active attacks, conduct post-attack analysis, and design resilient architectures that maintain availability during DDoS campaigns. This diagnostic course focuses on identifying, analyzing, and resolving common failures, misconfigurations, and operational issues. Building on core knowledge, RCCE students will learn systematic troubleshooting methodologies that accelerate root-cause analysis and minimize downtime. Students work through realistic break-fix scenarios that build the diagnostic confidence needed for high-pressure production environments.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing DDoS Troubleshooting: In Practice
🧠 What You Will Learn
  • Execute hands-on tasks for in practice
  • Execute hands-on tasks for network security
  • Explain Course Overview fundamentals
  • Execute hands-on tasks for learning objectives
  • Execute hands-on tasks for diagnostic focus — covering Classify DDoS attack types by vector and layer.
  • Execute hands-on tasks for memcached reflection — covering Goal: Saturate bandwidth, SYN Flood, ACK Flood.
  • Execute hands-on tasks for goal: saturate bandwidth — covering SYN Flood, ACK Flood, TCP State Exhaustion.
  • Execute hands-on tasks for syn flood — covering ACK Flood, TCP State Exhaustion, Fragmentation Attacks.
  • Execute hands-on tasks for ack flood — covering TCP State Exhaustion, Fragmentation Attacks, LAND Attack.
  • Execute hands-on tasks for tcp state exhaustion — covering Fragmentation Attacks, LAND Attack.
  • Execute hands-on tasks for fragmentation attacks — covering LAND Attack.
  • Execute hands-on tasks for api abuse — covering Goal: Exhaust app resources.
📚 Course Outline
Module 01In Practice
Module 02Network Security
Module 03Course Overview
Module 04Learning Objectives
Module 05Diagnostic Focus
Module 06Memcached Reflection
Module 07Goal: Saturate bandwidth
Module 08SYN Flood
Module 09ACK Flood
Module 10TCP State Exhaustion
Module 11Fragmentation Attacks
Module 12API Abuse
Module 13Volumetric Attacks: Deep Dive
Module 14Amplification Attacks
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice ddos troubleshooting: in practice by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for in practice
  • Lab 2: Execute hands-on tasks for network security
  • Lab 3: Explain Course Overview fundamentals
  • Lab 4: Execute hands-on tasks for learning objectives
  • Lab 5: Execute hands-on tasks for diagnostic focus
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for DDoS Troubleshooting: In Practice, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI