Companies Home Search Profile

MikroTik RouterOS v7 Hardening LABS

Focused View

Maher Haddad

3:33:01

100 View
  • 001 Introduction.mp4
    02:05
  • 002 Connect the MikroTik router to the internet & upgrade it to the latest version.mp4
    27:11
  • 001 Intro - Protect MikroTik from Physical threats.mp4
    01:36
  • 002 Basic security against physical threats.mp4
    16:59
  • 003 More security against the physical threats.mp4
    10:43
  • 003 disable-interfaces-cli.zip
  • 004 Secure LCD Touchscreen and Console port.mp4
    14:34
  • 001 Intro - Managing Users on MikroTik RouterOS v7.mp4
    02:02
  • 002 Working with users, groups and privileges.mp4
    14:51
  • 003 Allowing users login on a time interval.mp4
    13:36
  • 001 Introduction to Port Knocking on MikroTik Routers.mp4
    01:35
  • 002 Configuring Port Knocking on MikroTik RouterOS v7.mp4
    17:06
  • 001 Intro - Disable unnecessary protocols on the MikroTik Router.mp4
    02:02
  • 002 Disable unnecessary protocols and protect SSH on the MikroTik router.mp4
    20:38
  • 001 Introduction to Lockdown on the MikroTik RotuerOS.mp4
    02:03
  • 002 Lockdown the MikroTik RouterOS v7.mp4
    20:34
  • 001 MikroTik Firewall chains and actions.mp4
    21:58
  • 002 MikroTik Connection States.mp4
    07:12
  • 003 Configuring Firewall Filter Rules on MikroTik RouterOS v7.mp4
    12:46
  • 003 bogon-address-list.zip
  • 004 Bonus Lecture.mp4
    03:30
  • 004 social-media-and-contact-details.zip
  • Description


    Secure your MikroTik RouterOS and make it hard on intruders & attackers to penetrate into your network

    What You'll Learn?


    • Have a more secure network after securing the Mikrotik Router
    • Configuring Port Knocking for login safety
    • Disabling un-secure protocols like FTP, Telnet, www, api....
    • Securing MikroTik LCD Screentouch access
    • Allowing users to login to the router on a time interval
    • Creating different users levels and manage users' groups
    • Exploit the security holes on MikroTik and secure them
    • Using "address-list" for Port Knocking security
    • Using NMAP software to scan the vulnerabilities and open ports on the Mikrotik router
    • Understand the different chains available in the firewall of the Mikrotik
    • Unsderstand the correct usage of the Firewall chains: Input, Output, Forward
    • Understand the different type of connections: New, Established, related, invalid
    • Understand the different types of security measurement in MikroTik

    Who is this for?


  • Anyone interested in securing the MikroTik RouterOS
  • Anyone who would like to implement security on his MikroTik router(s) at his job
  • More details


    Description

    This course is designed for engineers who are working on MikroTik routers and who have them installed on their network.

    MikroTik routers are very nice routers when it comes on the different packages that they have installed by default and features that you can configure, but they can be also very dangerous if we do not secure them correctly.


    For this reason, I have designed with course with many LABs to show you how you can secure your MikroTik router and make it hard for intruders/attackers to profit from the vulnerabilities on your MikroTik router and gain access to your router and  your network.

    This course is based on different LABS which goes based on step-by-step and with a lot of explanation on each of the  LABs.

    For the whole course, I will be using the latest MikroTik RouterOS v7 for all the LABS. To be able to follow this course and repeat the LABS, you require to have only 1 MikroTik router (only in 1 LAB you need 2 MikroTik routers). You can also using virtual CHR images to follow this course, so you don't have to invest in buying a physical MikroTik router.

    I look forward to see you in my course.

    Who this course is for:

    • Anyone interested in securing the MikroTik RouterOS
    • Anyone who would like to implement security on his MikroTik router(s) at his job

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Maher Haddad
    Maher Haddad
    Instructor's Courses
    Hello everyone. My name is Maher Haddad with a very long experience in the IT sector. I hold a Bachelor in Computer Communications and a Master in Computer science. I work as a trainer and I hold the following certificates: CCNA, CCNA Security, CCNA Voice, CCDA, CCNP R&S, CCDP,  Microsoft MCP, Microsoft MCSA , MikroTik MTCNA, MTCRE, MTCWE, MTCUME, MTCTCE, MTCINE, MTCSE, MTCSWE, MTCWEW, MTCIPv6 Huawei HCNA, CWTS, Ubiquiti UEWA, LigoWave NFT engineer, LigoWave DLB Engineer, Fortinet NSE1, Fortinet NSE2,  GVF Level1, GVF level2, GVF Level3 and much more.....My experience in IT goes to year 2003 and I have been working all my life for international Internet Service Providers (ISP's) in different countries in the world. I hope you will enjoy watching my courses.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 19
    • duration 3:33:01
    • Release Date 2023/02/14

    Courses related to MikroTik