***This course is not officially sponsored by MikroTik and not an authorized course by MikroTik. We are neither affiliated with nor endorsed by MikroTik. We respect the Trademarks of the mentioned company and institution.***


Description

If you're a network engineer, safeguarding your network from cyber attacks is always a priority, and implementing an effective security plan can be challenging.

This course focuses on MikroTik's comprehensive firewall features, designed to protect your network from various types of cyber threats. Our aim is to guide you through each step with real LAB scenarios, ensuring your MikroTik routers are well-protected against any form of cyber attacks.

Aligned with the MikroTik MTCSE syllabus, this course not only covers all relevant topics but also prepares you for the certification exam.

Throughout the course, I'll simulate cyber attacks on a MikroTik router to identify vulnerabilities and demonstrate effective protection strategies. You'll get hands-on experience through extensive LAB exercises, which you can replicate independently.

Key topics we'll cover include various security aspects in MikroTik and methods to fortify your routers. Some of the topics we'll explore are:

  • Attacks, mechanisms and services
  • The most common threats
  • RouterOS security deployment
  • Packet flow, firewall chains
  • Stateful firewall
  • RAW table
  • SYN flood mitigation
  • RouterOS default configuration
  • Best practices for management access
  • Detecting an attack to critical infrastructure services
  • Bridge filter
  • Advanced options in firewall filter
  • ICMP filtering
  • MNDP attacks and prevention
  • DHCP: rogue servers, starvation attacks and prevention
    TCP SYN attacks and prevention
  • UDP attacks and prevention
  • ICMP Smurf attacks and prevention
  • FTP, telnet and SSH brute-force attacks and prevention
  • Port scan detection and prevention
  • Introduction to cryptography and terminology
  • Encryption methods • Algorithms - symmetric, asymmetric
  • Public key infrastructure (PKI)
  • Port knocking
  • Secure connections (HTTPS, SSH, WinBox)
  • Default ports for the services

Alongside all the security topics covered, there is a specific module dedicated to explaining VPN tunneling. This module will include the following topics:

  • Introduction to IPsec
  • L2TP + IPsec
  • SSTP with certificates

This course is specifically designed for network engineers, technicians, and students who aim to effectively deploy and secure networks utilizing MikroTik devices. It offers an in-depth and practical learning experience with numerous hands-on LABS, ensuring a comprehensive understanding of various types of cyber attacks and effective strategies to safeguard your MikroTik routers.

If your goal is to become a proficient MikroTik Security Professional and to successfully pass the MTCSE exam, then this course is a crucial step on your path. Don't hesitate to take this course and start your journey towards expert-level knowledge in MikroTik network security

Who this course is for
  • Students and engineers interested to understand how to deploy security in MikroTik
  • Students and engineers who wants to be prepared for the MikroTik MTCSE exam
What you'll learn
  • Configuring Port Knocking on MikroTik router
  • Disable unnecessary protocol on the MikroTik Router
  • Configure user management to allow particular users to login into the MikroTik Router
  • Protect the MikroTik Router from Brute force attacks
  • Protect the MikroTik router from DHCP starvation attacks
  • Protect the MikroTik router from rogue DHCP servers using DHCP Snooping
  • Protect the MikroTik router from ICMP flood attack
  • Protoct the MikroTik router from all type of DOS attacks
  • Understand how packet flow works in MikroTik routers
  • Understand and configure PPTP tunnelling
  • Understand and configure L2TP/IPSEC tunnelling
  • Understand and configure IPSEC VPN tunnelling
  • Understand how to configure Firewall rule using RAW table
  • Configure Firewall protection against TCP SYN attacks
  • Configure Firewall Protection against UDP attacks and prevention
  • Understand and configure Certificates in MikroTik routers to secure connections to the router
  • Configure Bridge filtering
  • Configure the MikroTik Router to prevent all type of ports scan
  • Understand the different type of Chains in the MikroTik Firewall
  • Prevent MNDP attacks using the MikroTik Firewall
  • Understand and configure SSTP tunnelling protocol with certificates
  • Understand IPSEC IKEv1 & IKEv2
  • Configure IPSEC site to site
Requirements
  • Have at least MikroTik MTCNA level
  • Understand basic networking topics such as TCP/IP, OSI Layer, etc
  • Have a good knowledge in MikroTik

Your Instructor

Hello, everyone!

I'm Maher Haddad, a MikroTik Certified Trainer, Cisco Authorized Instructor, and LigoWave Authorized Trainer.

In my courses, I emphasize a blend of theory and hands-on labs, giving you the opportunity to apply what you learn.

As of 2022, more than 100,000 students have benefitted from my training.

I hope you'll enjoy watching and learning from my courses.

Course Curriculum


  Disable unnecessary protocols on the MikroTik Router
Available in days
days after you enroll
  Protecting MikroTik Logins with Port Knocking
Available in days
days after you enroll
  Get the right people to login into your MikroTik Router
Available in days
days after you enroll
  LockDown the Mikrotik Router - Disable unnecessary tools
Available in days
days after you enroll
  DHCP attacks and Prevention
Available in days
days after you enroll
  How the packets flow in MikroTik
Available in days
days after you enroll
  Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)
Available in days
days after you enroll
  Encrypted Tunnels on RouterOS
Available in days
days after you enroll
  Internet Protocol Security (IPSEC) Framework
Available in days
days after you enroll