Autoplay
Autocomplete
Previous Lesson
Complete and Continue
MikroTik Security Engineer with LABS
Disable unnecessary protocols on the MikroTik Router
1- Security course content difference between RouterOS v6 and v7 (1:53)
2- Disable unnecessary protocols Intro (1:18)
3- Disable unnecessary packages and protocol on the Mikrotik Router (14:31)
4- Protect the access using SSH and Winbox (13:05)
Protecting MikroTik Logins with Port Knocking
5- Protecing MikroTik Login with Port Knocking (2:00)
6- Configuring MikroTik Port Knocking - Part1 (15:39)
7- Configuring MikroTik Port Knocking - Part2 (14:31)
Get the right people to login into your MikroTik Router
8- User Management Intro (1:30)
9- User Management (17:25)
10- Allowing user login on a time interval (9:34)
LockDown the Mikrotik Router - Disable unnecessary tools
11- Lockdown the Mikrotik router (16:47)
12- Disable BW Test and Rommon (7:07)
DHCP attacks and Prevention
13- Preventing DHCP Starvation attack (24:22)
14- Protect your network with DHCP Snooping (20:10)
How the packets flow in MikroTik
15- Introduction to Packet Flow on MikroTik (2:06)
16- MikroTik Packet Flow - Explanation (14:38)
17- MikroTik Packet flow - Examples (12:17)
Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)
18- Introduction to the MikroTik Firewall (1:34)
19- Overview of the Firewall on the MikroTik RouterOS (17:14)
20- Disabling Connection Tracking on the MikroTik Router (12:44)
21- What are the connection states availble on the MikroTik RouterOS (8:54)
22- Protect your MikroTik router using connection state in the Firewall (20:25)
23- Brute Force attack and Prevention (27:50)
24- Use the Firewall to Protect your MikroTik router from Ping flood (14:59)
25- Accept important ICMP Message types in your MikroTik Firewall (21:55)
26- Preventing ICMP Smurf attack (12:09)
27- Block Bogon IP addresses on MikroTik Firewall (7:54)
28- Drop port scan attacks using the MikroTik firewall (15:46)
29- Block Syn Flood and DDOS using the MikroTik Firewall (19:21)
30- Use MikroTik RAW firewall to protect your Network (9:20)
31- Preventing UDP Flood Attack (21:28)
32- MNDP Attack Prevention (16:24)
33- Redirect DNS traffic to the router’s DNS (11:57)
34- Changing the destination address using Dst-nat (7:31)
35- Use Mangle to mark connections and packets (17:09)
36- Use Mangle Hide your router IP address when doing traceroute (7:25)
Encrypted Tunnels on RouterOS
37- Introduction to VPN (0:57)
38- What is VPN and why is it important to use it in our network (15:52)
39- L2TP IPSEC Tunneling protocol - Explanation (7:10)
40- Configuring L2TP site to site VPN (23:03)
41- Configuring L2TP IPSEC client to site VPN (10:38)
42- SSTP Tunneling Protocol - Explanation (8:08)
43- Configuring SSTP site to site VPN (without certificates) (14:10)
44- Configuring SSTP site to site VPN (with Certificates) (20:31)
45- Configuring SSTP client to site VPN (16:11)
Internet Protocol Security (IPSEC) Framework
3- What is IPSEC - Intro (1:37)
4- What is IPSEC - Explanation (9:10)
5- IPSEC Protocol suite explained (5:15)
6- IPSEC modes of communication - Transport vs Tunnel mode (8:16)
7- Types of Encryption - Symmetric vs Asymmetric (5:57)
8- Security over the internet using IPSEC (14:47)
9- Encyption Protocols (DES-3DES-AES-Blowfish-Camellia-RSA-DH) (15:30)
10- Data Integrity - Hashing Algorithms (MD5 - SHA1 - SHA256 - SHA512) (8:52)
11- IPSEC Authentication (Pre-shared key vs Certificates) (8:47)
12- IPSEC Negotiation Protocols (AH vs ESP) (8:10)
13- IPSEC Negotiation Process - Introduction (1:00)
14- IPSEC Negotiation Process and choices of IPSEC interesting traffic (9:04)
15- IPSEC IKE Phase 1 (ISAKMP Tunnel) (8:40)
16- IPSEC IKE Phase 1 (Main vs Aggressive mode) (5:43)
17- IPSEC IKE Phase 2 (IPSEC Tunnel) (7:03)
18- IPSEC Data Transfer (2:59)
19- Difference between IKEv1 and IKEv2 (5:45)
20- Introduction to the IPSEC LAB (1:27)
21- Pre-configuration of the IPSEC Tunnel (16:28)
22- Configuring site-to-site IPSEC tunnel using IKEv1 and IKEv2 - Part1 (21:00)
23- Configuring site-to-site IPSEC tunnel using IKEv1 and IKEv2 - Part2 (7:03)
24- Introduction to IPSEC IKEv2 Remote Access (1:30)
25- Creating Certificates for remote access IPSEC (14:38)
26- Configuring IPSEC IKEv2 remote access (14:33)
MikroTik official trainings with Maher Haddad (3:27)
19- Difference between IKEv1 and IKEv2
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock