


This course is designed for engineers who are working on MikroTik routers and who have them installed on their network. You should have basic networking knowledge You should be familiar with winbox for MikroTik RouterOS Understand the different types of security measurement in MikroTik Understand the different type of connections: New, Established, related, invalid Unsderstand the correct usage of the Firewall chains: Input, Output, Forward Understand the different chains available in the firewall of the Mikrotik Using NMAP software to scan the vulnerabilities and open ports on the Mikrotik router Using “address-list” for Port Knocking security

Have a more secure network after securing the Mikrotik RouterĬonfiguring Port Knocking for login safetyĭisabling un-secure protocols like FTP, Telnet, www, api….Īllowing users to login to the router on a time intervalĬreating different users levels and manage users’ groupsĮxploit the security holes on MikroTik and secure them
