The curriculum spans the technical, operational, and organisational dimensions of DoS incident management, comparable in scope to a multi-phase internal capability program that integrates network engineering, incident response, legal compliance, and executive engagement across real-world attack scenarios.
Module 1: Threat Landscape and DoS Classification
- Selecting packet-level signatures for distinguishing volumetric attacks from protocol anomalies in network telemetry.
- Configuring network taps and SPAN ports to capture full packet data during suspected amplification attacks.
- Implementing traffic baselining to detect deviations indicative of low-and-slow DoS attacks on application endpoints.
- Evaluating third-party threat intelligence feeds for relevance to known DoS actor TTPs targeting similar industries.
- Classifying attack sources by IP reputation scores and geolocation to support upstream filtering decisions.
- Documenting incident taxonomy to align internal reporting with MITRE ATT&CK DoS techniques (T1498).
Module 2: Detection Architecture and Monitoring
- Deploying flow-based monitoring (NetFlow, IPFIX) on core routers to identify traffic spikes exceeding threshold policies.
- Integrating IDS/IPS rules to detect SYN flood patterns and abnormal HTTP request rates at the edge firewall.
- Configuring SNMP polling intervals on border routers to balance detection latency with performance overhead.
- Correlating alerts from WAFs and DDoS mitigation appliances to reduce false positives during multi-vector attacks.
- Setting up anomaly detection thresholds using seasonal baselines to avoid alert fatigue during peak business hours.
- Validating detection coverage across encrypted traffic using TLS fingerprinting and JA3 analysis.
Module 3: Mitigation Infrastructure and Tooling
- Routing traffic through cloud scrubbing centers using BGP announcements during volumetric attacks.
- Configuring rate limiting policies on load balancers to protect backend servers from HTTP flood attacks.
- Implementing blackhole routing via BGP to null-route attack traffic at the ISP level.
- Deploying on-premises mitigation appliances with automatic failover to cloud-based DDoS protection services.
- Testing failover procedures between primary and secondary DNS providers during DNS flood events.
- Validating geo-blocking rules on CDN edge nodes to mitigate region-specific attack sources.
Module 4: Incident Response Playbooks and Escalation
- Activating predefined communication trees to notify ISP, cloud providers, and legal teams during attack onset.
- Executing pre-approved BGP changes to reroute traffic without introducing routing loops.
- Documenting time-stamped actions taken during mitigation for post-incident regulatory reporting.
- Coordinating with external CERTs to share IoCs when attacks originate from botnet infrastructure.
- Initiating executive briefings with technical summaries when business continuity is at risk.
- Validating chain of custody for logs collected from third-party mitigation providers.
Module 5: Legal and Regulatory Considerations
- Assessing data retention policies for network flow logs under GDPR and CCPA requirements.
- Consulting legal counsel before initiating countermeasures that could be interpreted as offensive actions.
- Reporting DoS incidents to regulatory bodies when they impact critical infrastructure availability.
- Reviewing SLAs with cloud providers to determine liability for downtime during sustained attacks.
- Preserving forensic artifacts to support potential civil litigation against botnet operators.
- Aligning incident disclosure timelines with industry-specific regulatory frameworks (e.g., NIS2, HIPAA).
Module 6: Post-Incident Analysis and Forensics
- Reconstructing attack timelines using correlated timestamps from firewalls, routers, and application logs.
- Extracting packet payloads from PCAPs to identify exploit patterns in application-layer DoS attempts.
- Mapping attack sources to known botnet C2 infrastructure using passive DNS data.
- Calculating financial impact based on service downtime, mitigation costs, and SLA penalties.
- Conducting blameless post-mortems to identify gaps in detection coverage or response delays.
- Updating threat models to reflect new attacker behaviors observed during recent incidents.
Module 7: Resilience Engineering and Capacity Planning
- Designing redundant internet uplinks with diverse physical paths to maintain connectivity during edge saturation.
- Stress-testing auto-scaling groups to validate horizontal scaling under synthetic HTTP flood conditions.
- Implementing DNS TTL reductions prior to expected attack windows to enable faster failover.
- Conducting tabletop exercises to validate cross-team coordination during multi-vector attacks.
- Right-sizing cloud-based DDoS protection tiers based on historical peak traffic and growth projections.
- Architecting microservices with circuit breakers to prevent cascading failures under resource exhaustion.
Module 8: Stakeholder Communication and Executive Reporting
- Translating technical attack metrics (e.g., PPS, BPS) into business impact statements for non-technical leaders.
- Preparing incident dashboards that track mitigation effectiveness and system recovery timelines.
- Coordinating public statements with PR teams to avoid disclosing technical details that could aid attackers.
- Presenting risk treatment options (accept, mitigate, transfer) for recurring DoS threats to risk committees.
- Documenting decision rationale for mitigation actions taken under time pressure for audit purposes.
- Aligning DoS preparedness budgets with enterprise risk appetite defined in board-level risk assessments.