MikroTik RouterOS Hardening LABS

Maher Haddad, IT Trainer

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
23 Videos (4h 10m)
    • Course introduction

      3:35
    • Lesson 1 - Introduction

      1:35
    • Get your Mikrotik router connected to the internet

      19:37
    • Fix the bugs by updating the pacakges

      14:01
    • Basic security against physical threats

      17:32
    • More security against the physical threats

      17:09
    • So what should protect more????

      2:09
    • Securing the LCD screen touch and disable the console port

      9:19
    • Introduction to User Management on the MikroTik Router

      1:48
    • Working with users, groups and priviliges

      17:44
    • Working with users, groups and priviliges

      9:53
    • Working with users, groups and priviliges

      2:19
    • Configuring MikroTik Port Knocking - Part1

      15:58
    • Configuring MikroTik Port Knocking - Part2

      14:49
    • What are the unnecessary protocols?

      1:36
    • Turn off unnecessary packages, scan for open protocols and disable them

      14:50
    • Protect the access on the Mikrotik Router using SSH and Winbox

      13:24
    • Lesson 7 Lockdown the Mikrotik router

      17:05
    • Disable MAC Winbox, MAC Ping & neighbor discovery

      7:26
    • Introduction to MikroTik Firewall

      1:51
    • What are the Firewall Chains?

      16:51
    • Understand the different rules actions and connection types

      10:28
    • Configuring firewall filter rules on Mikrotik

      19:24

About This Class

This course is designed for engineers who are working on MikroTik routers and who have them installed on their network.

MikroTik routers are very nice routers when it comes on the different packages that they have installed by default, but they can be also very dangerous if we do not secure them correctly. 
For this reason, I have designed with course with many LABs to show you how you can secure your MikroTik router and make it hard for intruders/attackers to profit from the vulnerabilities on your MikroTik router to gain access to your network.

This course is based on different LABS which goes based on step-by-step and with a lot of explanation on each of the LABs.

I hope that you will enjoy it.

6

Students

--

Projects

0

Reviews (0)

Maher Haddad

IT Trainer

Hello everyone. My name is Maher Haddad with a very long experience in the IT sector. I hold a Bachelor in Computer Communications and a Master in Computer science.

I work as a trainer and I hold the following certificates: CCNA, CCNA Security, CCNA Voice, CCDA, CCNP R&S, CCDP, Microsoft MCP, Microsoft MCSA , MikroTik MTCNA & MTCRE, MTCWE, MTCUME, CWTS, GVF Level1, GVF level2, GVF Level3 and much more.....

My experience in IT goes to year 2003 and I have been working all ...

See full profile

Technology IT Security MikroTik