Skip to content
Holiday Closure Notice: In observance of 4th of July, our office will be closed tomorrow.

INCREDIBLE SAVINGS - Access Points, LTE devices, Antennas, Accessories and more. Shop Now and Save Up to 80% Off!
Holiday Closure Notice: In observance of 4th of July, our office will be closed tomorrow.

INCREDIBLE SAVINGS - Access Points, LTE devices, Antennas, Accessories and more. Shop Now and Save Up to 80% Off!

Country

MikroTik: MikroTik RouterOS v7 Hardening LABS

BNT-ONL-MT-035 by Baltic Networks

Fortify your MikroTik RouterOS security to bolster protection against network penetrations.

Description

This course is tailored for engineers actively engaged with MikroTik routers in their network infrastructure.

MikroTik routers boast an array of default packages and configurable features, making them highly versatile. However, the same flexibility can pose risks if not properly secured. With this in mind, I've developed this course, enriched with numerous hands-on LABS, to guide you through the process of securing your MikroTik router effectively. The objective is to fortify your router against potential intruders or attackers, minimizing the vulnerabilities that could compromise your router and network.

The course is structured around detailed step-by-step LABS, offering thorough explanations for each session. It is my hope that you find the content both insightful and enjoyable.

Who this course is for

  • Anyone interested in securing the MikroTik RouterOS
  • Anyone who would like to implement security on his MikroTik router(s) at his job

What you'll learn

  • Have a more secure network after securing the Mikrotik Router
  • Configuring Port Knocking for login safety
  • Disabling un-secure protocols like FTP, Telnet, www, api....
  • Securing MikroTik LCD Screentouch access
  • Allowing users to login to the router on a time interval
  • Creating different users levels and manage users' groups
  • Exploit the security holes on MikroTik and secure them
  • Using "address-list" for Port Knocking security
  • Using NMAP software to scan the vulnerabilities and open ports on the Mikrotik router
  • Understand the different chains available in the firewall of the Mikrotik
  • Understand the correct usage of the Firewall chains: Input, Output, Forward
  • Understand the different type of connections: New, Established, related, invalid
  • Understand the different types of security measurement in MikroTik

Requirements

  • You should be familiar with Winbox for MikroTik RouterOS
  • You should have basic networking knowledge
  • You should know the TCP/IP protocol
Interested in this course? Discover how to gain access: Get Access