Udemy

MikroTik Security Engineer with LABS

Enroll Now
  • 3,603 Students
  • Updated 1/2025
4.7
(617 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
12 Hour(s) 34 Minute(s)
Language
English
Taught by
MA ICT B.V
Rating
4.7
(617 Ratings)

Course Overview

MikroTik Security Engineer with LABS

Become a MikroTik Security Professional and be ready for the MikroTik MTCSE exam

***This course is not officially sponsored  by MikroTik and not an authorized course by MikroTik. We are neither affiliated with nor endorsed by MikroTik. We respect the Trademarks of the mentioned company and institution.***


As a network engineer, you have always a concern to protect your network from outside cyber attacks. This is most of the the time a challenge when it comes to deploy a security plan to your network.

MikroTik has an extensive firewall feature that can protect your network from all different types of Cyber attacks. The goal of this course is to show you all different steps using real LAB scenarios of how to protect your MikroTik router(s) from any type of cyber attacks and do not let hackers to compromise your network.

This course is based on the MikroTik MTCSE syllabus. So by taking this course, you will cover all the topics of the MikroTik MTCSE track and you will be ready for the exam.

In this course, I will issue cyber attacks to my MikroTik router to see what are the weaknesses available on the router and then show you how you can protect it. All the course will be based on Hands-on LABS that you can re-do them yourself after following this course.

In this course, I will discuss about all security concerns in MikroTik and how to protect your router(s). Some example of the topics that will be explained are:

• Attacks, mechanisms and services
• The most common threats
• RouterOS security deployment
• Packet flow, firewall chains
• Stateful firewall
• RAW table
• SYN flood mitigation
• RouterOS default configuration
• Best practices for management access
• Detecting an attack to critical infrastructure services
• Bridge filter
• Advanced options in firewall filter
• ICMP filtering
• MNDP attacks and prevention
• DHCP: rogue servers, starvation attacks and prevention
• TCP SYN attacks and prevention
• UDP attacks and prevention
• ICMP Smurf attacks and prevention
• FTP, telnet and SSH brute-force attacks and prevention
• Port scan detection and prevention
• Introduction to cryptography and terminology
• Encryption methods • Algorithms - symmetric, asymmetric
• Public key infrastructure (PKI)
• Port knocking
• Secure connections (HTTPS, SSH, WinBox)
• Default ports for the services


In addition of all those security topics, there is one module which explain about the VPN tunneling and will contain the following topics:

• Introduction to IPsec
• L2TP + IPsec
• SSTP with certificates


This course is ideal for Network engineers, technicians and students wanting to deploy and secure MikroTik device based networks. The content of this course is very rich and it has a lot of hands-on LABs so you are more familiar about the types of attacks and how to protect your MikroTik routers from them.


So, are you looking to become a MikroTik Security Professional and be ready for the MTCSE exam? If yes, please do not wait to enroll to my course.



Course Content

  • 9 section(s)
  • 68 lecture(s)
  • Section 1 Disable unnecessary protocols on the MikroTik Router
  • Section 2 Protecing MikroTik Logins with Port Knocking
  • Section 3 Get the right people to login into your MikroTik Router
  • Section 4 LockDown the Mikrotik Router - Disable unnecessary tools
  • Section 5 DHCP attacks and Prevention
  • Section 6 How the packets flow in MikroTik
  • Section 7 Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)
  • Section 8 Encrypted Tunnels on RouterOS
  • Section 9 Internet Protocol Security (IPSEC) Framework

What You’ll Learn

  • Configuring Port Knocking on MikroTik router
  • Disable unnecessary protocol on the MikroTik Router
  • Configure user management to allow particular users to login into the MikroTik Router
  • Protect the MikroTik Router from Brute force attacks
  • Protect the MikroTik router from DHCP starvation attacks
  • Protect the MikroTik router from rogue DHCP servers using DHCP Snooping
  • Protect the MikroTik router from ICMP flood attack
  • Protoct the MikroTik router from all type of DOS attacks
  • Understand how packet flow works in MikroTik routers
  • Understand and configure PPTP tunnelling
  • Understand and configure L2TP/IPSEC tunnelling
  • Understand and configure IPSEC VPN tunnelling
  • Understand how to configure Firewall rule using RAW table
  • Configure Firewall protection against TCP SYN attacks
  • Configure Firewall Protection against UDP attacks and prevention
  • Understand and configure Certificates in MikroTik routers to secure connections to the router
  • Configure Bridge filtering
  • Configure the MikroTik Router to prevent all type of ports scan
  • Understand the different type of Chains in the MikroTik Firewall
  • Prevent MNDP attacks using the MikroTik Firewall
  • Understand and configure SSTP tunnelling protocol with certificates
  • Understand IPSEC IKEv1 & IKEv2
  • Configure IPSEC site to site


Reviews

  • E
    Emanuel Acácio De Sousa
    4.5

    With this course have been helped, to undestand some topics which i don't had undestanded with others teachrs on youtube and other explanations. But here i can know a little more about security and method to organize them.

  • D
    Dianto
    5.0

    Penyampaian materi jelas

  • J
    José Eduardo Martínez Paz
    5.0

    So far very good content and explanation. covers what I expected and in looking forward to learning more.

  • A
    Ahmad Aidil Fajri
    5.0

    Great

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed