Visão Geral
								Este Curso Cloudflere DDoS Attack Types and Mitigation aborda os tipos de ataques DDoS (volumetric, protocol e application-layer), como eles impactam infraestruturas modernas e as estratégias de mitigação usando as capacidades da plataforma Cloudflare (e ferramentas complementares). Os participantes aprenderão a identificar vetores de ataque, projetar defesas em múltiplas camadas, aplicar regras de WAF, rate limiting, bot management, Magic Transit e “Under Attack” actions, e montar playbooks de resposta a incidentes com foco em resiliência e continuidade dos negócios. Cloudflare+1
							 
						
													
								Objetivo
								Ao concluir este curso, o participante será capaz de:
	- Entender e classificar os principais tipos de DDoS (volumetric, protocol e application-layer). Imperva+1
 
	- Projetar uma defesa em camadas para proteger aplicações do tráfego malicioso. Cloudflare
 
	- Configurar e aplicar políticas de mitigação no Cloudflare: rate limiting, WAF managed rulesets, bot management, Under Attack mode e Magic Transit. Cloudflare+2Cloudflare Docs+2
 
	- Monitorar e responder a incidentes DDoS com playbooks, métricas e integração com sistemas de observabilidade (logs, métricas e alertas). Cloudflare Docs
 
							 
						
													
								Publico Alvo
								
	- Profissionais de segurança (SOC), engenheiros de rede/cloud, administradores de infraestrutura, arquitetos de soluções, SREs e DevOps que precisam proteger serviços web, APIs e infraestruturas contra ataques DDoS.
 
							 
						
													
								Pre-Requisitos
								
	- Conhecimentos básicos de redes (TCP/IP), HTTP e arquitetura de aplicações web.
 
	- Noções de cloud (AWS/Azure/GCP) e experiência com configurações de DNS e balanceamento.
 
	- Desejável: experiência prévia com Firewalls/IDS ou CDNs.
 
							 
						
						
													
								
Materiais
								Português + Exercícios + Lab Pratico 							
						
						
													
								Conteúdo Programatico
								Module 1: DDoS Fundamentals
	- Definition and goals of DDoS attacks
 
	- Categories: volumetric, protocol, and application-layer attacks
 
	- Common vectors: UDP/TCP floods, SYN/ACK floods, DNS amplification, HTTP floods, Slowloris, and botnets
 
	- Impact on availability, latency, and downstream services. Imperva+1
 
Module 2: Anatomy of a DDoS Attack
	- Attack lifecycle and reconnaissance techniques
 
	- Measuring attack scale: bps, pps and connections/s
 
	- Multi-vector attacks and layered escalation strategies
 
	- Case studies of large-scale attacks and lessons learned. PC Gamer+1
 
Module 3: Cloudflare Platform Capabilities
	- Overview of Cloudflare’s DDoS protection approach and global edge network capacity. Cloudflare
 
	- Network-layer protections (L3/L4) and managed rulesets. Cloudflare Docs
 
	- Application-layer protections, WAF, managed rules and rate limiting. Cloudflare Docs+1
 
Module 4: Practical Mitigations — Configuration and Tuning
	- Implementing rate limiting and thresholds for APIs and login endpoints. Cloudflare
 
	- Creating WAF rules (managed + custom) and API sequencing rules. The Cloudflare Blog
 
	- Bot Management: detection, challenge flows and automated blocking
 
	- Using “Under Attack” mode for high-risk L7 surges and Magic Transit for network-level defenses. Cloudflare Docs+1
 
Module 5: Edge + Origin Resilience
	- Traffic filtering at edge vs origin hardening (rate limits, connection limits, autoscaling)
 
	- Origin while-onboarding: shielding origin with Cloudflare and configuring health checks
 
	- DNS best practices to minimize DNS amplification and DNS floods. Cloudflare+1
 
Module 6: Observability and Incident Response
	- Key telemetry: traffic baselines, anomaly detection, pps/bps/response time dashboards
 
	- Integrating Cloudflare logs with SIEM, Prometheus/Grafana and alerting rules
 
	- Runbooks and incident playbooks: mitigation steps, safe rollback and communication templates. Cloudflare Docs
 
Module 7: Hands-On Labs
	- Lab 1: Simulating a traffic spike (safe, synthetic) and applying rate limiting + WAF rules.
 
	- Lab 2: Configuring Bot Management and validating challenge flows.
 
	- Lab 3: Enabling Under Attack mode and observing mitigation behavior.
 
	- Lab 4: Integrating Cloudflare logs with a SIEM (demo) and creating Grafana dashboards.
 
Module 8: Advanced Topics & Best Practices
	- Multi-cloud and hybrid scenarios: protecting services across providers
 
	- Cost vs. protection trade-offs; SLA considerations and vendor selection
 
	- Legal, forensics and attribution basics after a large-scale DDoS event
 
	- Preparing long-term resilience: progressive hardening and table-top exercises.
 
							 
						
						TENHO INTERESSE