Autoplay
Autocomplete
Previous Lesson
Complete and Continue
MikroTik Security Engineer with LABS
Disable unnecessary protocols on the MikroTik Router
Security course content difference between RouterOS v6 and v7 (2:08)
Disable unnecessary protocols Intro (1:17)
Disable unnecessary packages and protocol on the Mikrotik Router (14:31)
Protect the access using SSH and Winbox (13:05)
Protecing MikroTik Logins with Port Knocking
Protecing MikroTik Login with Port Knocking (2:00)
Configuring MikroTik Port Knocking - Part1 (15:39)
Configuring MikroTik Port Knocking - Part2 (14:31)
Get the right people to login into your MikroTik Router
User Management Intro (1:29)
User Management (17:25)
Allowing user login on a time interval (9:34)
LockDown the Mikrotik Router - Disable unnecessary tools
Lockdown the Mikrotik router (16:46)
Disable BW Test and Rommon (7:07)
DHCP attacks and Prevention
Preventing DHCP Starvation attack (24:22)
Protect your network with DHCP Snooping (20:10)
How the packets flow in MikroTik
Introduction to Packet Flow on MikroTik (2:06)
MikroTik Packet Flow - Explanation (14:38)
MikroTik Packet flow - Examples (12:17)
Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)
Introduction to the MikroTik Firewall (1:34)
Overview of the Firewall on the MikroTik RouterOS (17:14)
Disabling Connection Tracking on the MikroTik Router (12:44)
What are the connection states availble on the MikroTik RouterOS (8:54)
Protect your MikroTik router using connection state in the Firewall (20:25)
Brute Force attack and Prevention (27:50)
Use the Firewall to Protect your MikroTik router from Ping flood (14:59)
Accept important ICMP Message types in your MikroTik Firewall (21:55)
Preventing ICMP Smurf attack (12:09)
Block Bogon IP addresses on MikroTik Firewall (7:54)
Drop port scan attacks using the MikroTik firewall (15:45)
Block Syn Flood and DDOS using the MikroTik Firewall (19:21)
Use MikroTik RAW firewall to protect your Network (9:20)
Preventing UDP Flood Attack (21:28)
MNDP Attack Prevention (16:24)
Redirect DNS traffic to the router’s DNS (11:57)
Changing the destination address using Dst-nat (7:31)
Use Mangle to mark connections and packets (17:09)
Use Mangle Hide your router IP address when doing traceroute (7:25)
Encrypted Tunnels on RouterOS
Introduction to VPN (0:57)
What is VPN and why is it important to use it in our network (15:52)
L2TP IPSEC Tunneling protocol - Explanation (7:10)
Configuring L2TP site to site VPN (w/o IPSEC) (23:02)
Configuring L2TP IPSEC client to site VPN (10:38)
SSTP Tunneling Protocol - Explanation (8:08)
Configuring SSTP site to site VPN (without certificates) (14:10)
Configuring SSTP site to site VPN (with Certificates) (20:31)
Configuring SSTP client to site VPN (16:11)
Internet Protocol Security (IPSEC) Framework
3- What is IPSEC - Intro (1:37)
4- What is IPSEC - Explanation (9:10)
5- IPSEC Protocol suite explained (5:14)
6- IPSEC modes of communication - Transport vs Tunnel mode (8:16)
7- Types of Encryption - Symmetric vs Asymmetric (5:57)
8- Security over the internet using IPSEC (14:47)
9- Encyption Protocols (DES-3DES-AES-Blowfish-Camellia-RSA-DH) (15:30)
10- Data Integrity - Hashing Algorithms (MD5 - SHA1 - SHA256 - SHA512) (8:52)
11- IPSEC Authentication (Pre-shared key vs Certificates) (8:47)
12- IPSEC Negotiation Protocols (AH vs ESP) (8:10)
13- IPSEC Negotiation Process - Introduction (1:00)
14- IPSEC Negotiation Process and choices of IPSEC interesting traffic (9:04)
15- IPSEC IKE Phase 1 (ISAKMP Tunnel) (8:40)
16- IPSEC IKE Phase 1 (Main vs Aggressive mode) (5:42)
17- IPSEC IKE Phase 2 (IPSEC Tunnel) (7:02)
18- IPSEC Data Transfer (2:59)
19- Difference between IKEv1 and IKEv2 (5:45)
20- Introduction to the IPSEC LAB (1:27)
21- Pre-configuration of the IPSEC Tunnel (16:27)
22- Configuring site-to-site IPSEC tunnel using IKEv1 and IKEv2 - Part1 (21:00)
23- Configuring site-to-site IPSEC tunnel using IKEv1 and IKEv2 - Part2 (7:03)
MikroTik official trainings with Maher Haddad (3:27)
Accept important ICMP Message types in your MikroTik Firewall
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock