A network of infected computers controlled by a hacker
A tool used to amplify traffic
A type of application layer attack
A type of encryption used in DDoS attacks
All courses were automatically generated using OpenAI's GPT-3. Your feedback helps us improve as we cannot manually review every course. Thank you!