Description

This course is tailored for engineers actively engaged with MikroTik routers in their network infrastructure.

MikroTik routers boast an array of default packages and configurable features, making them highly versatile. However, the same flexibility can pose risks if not properly secured. With this in mind, I've developed this course, enriched with numerous hands-on LABS, to guide you through the process of securing your MikroTik router effectively. The objective is to fortify your router against potential intruders or attackers, minimizing the vulnerabilities that could compromise your router and network.

The course is structured around detailed step-by-step LABS, offering thorough explanations for each session. It is my hope that you find the content both insightful and enjoyable.

Who this course is for
  • Anyone interested in securing the MikroTik RouterOS
  • Anyone who would like to implement security on his MikroTik router(s) at his job
What you'll learn
  • Have a more secure network after securing the Mikrotik Router
  • Configuring Port Knocking for login safety
  • Disabling un-secure protocols like FTP, Telnet, www, api....
  • Securing MikroTik LCD Screentouch access
  • Allowing users to login to the router on a time interval
  • Creating different users levels and manage users' groups
  • Exploit the security holes on MikroTik and secure them
  • Using "address-list" for Port Knocking security
  • Using NMAP software to scan the vulnerabilities and open ports on the Mikrotik router
  • Understand the different chains available in the firewall of the Mikrotik
  • Understand the correct usage of the Firewall chains: Input, Output, Forward
  • Understand the different type of connections: New, Established, related, invalid
  • Understand the different types of security measurement in MikroTik
Requirements
  • You should be familiar with Winbox for MikroTik RouterOS
  • You should have basic networking knowledge
  • You should know the TCP/IP protocol

Your Instructor

Hello, everyone!

I'm Maher Haddad, a MikroTik Certified Trainer, Cisco Authorized Instructor, and LigoWave Authorized Trainer.

In my courses, I emphasize a blend of theory and hands-on labs, giving you the opportunity to apply what you learn.

As of 2022, more than 100,000 students have benefitted from my training.

I hope you'll enjoy watching and learning from my courses.

Course Curriculum


  Introduction
Available in days
days after you enroll
  Protect MikroTik from Physical threats
Available in days
days after you enroll
  Get the right people to login into your MikroTik Router
Available in days
days after you enroll
  Protecting MikroTik Logins with Port Knocking
Available in days
days after you enroll
  Disable unnecessary protocols on the MikroTik Router
Available in days
days after you enroll
  LockDown the Mikrotik Router - Disable unnecessary tools
Available in days
days after you enroll
  Enabling Firewall on the Mikrotik Router
Available in days
days after you enroll