Hackers Welcome

Let's conclude this chapter!

We'll cover the following

Ethical hacking

We are about to enter one of the final chapters of this course! After this brief overview of DDoS attacks and services we could use to prevent them, we are going to take a sharp turn and dive into the world of ethical hacking.

It would be great to have an unlimited amount of security researchers look at our services and let us know whether a vulnerability is lurking somewhere. It would also be fair to reward those researchers in case their findings lead to an improved security posture for our firm.


The next chapter introduces an amazing vehicle for all of this to happen, enter bug bounty programs.

But first, let’s take a quiz to test your knowledge of DDoS attacks!

Get hands-on with 1200+ tech skills courses.