Book objectives
The Advanced Security book (MTCSE Course – MikroTik Certified Security Engineer) is a comprehensive training program designed to help you master the fundamentals and best practices in cybersecurity with MikroTik.
Through a combination of theory and practical labs, this book will prepare you to meet network security challenges and effectively protect systems against increasingly sophisticated threats.
Chapter 1: Introduction
In this chapter, you will gain a solid understanding of computer security principles, the stages of the security process, and the different types of security attacks and threats. You will understand the key concepts and security measures necessary to safeguard systems.
Chapter 2: Firewall
You will learn about the importance of firewalls and explore how stateful firewall and connection tracking work. Through hands-on labs, you'll analyze traffic and learn how to configure and optimize your firewall to secure specific areas. Plus, you'll discover how to prevent common attacks and set custom settings.
Chapter 3: Attacks on the Layers of the OSI Model
You will explore a variety of attacks that affect different layers of the OSI model, such as the MikroTik Neighbor Discovery Protocol (MNDP), DHCP attacks, TCP SYN attacks, UDP Flood attacks, ICMP Smurf attacks, and brute force attacks. You will learn how to identify and prevent these attacks by implementing appropriate security measures.
Chapter 4: Cryptography
In this section, you will delve into the fundamentals of cryptography and security mechanisms. You will learn about different encryption methods, including symmetric and asymmetric encryption. Additionally, you will explore the concept of public key infrastructure (PKI), digital certificates, and how to use them to secure communication on networks.
Chapter 5: Router Security
You will discover advanced security techniques to protect the MikroTik router, such as Port Knocking, an effective solution for secure access to services on the router. You will learn about tunneling through SSH and the importance of changing the default ports of services to avoid unwanted attacks.
Chapter 6: Secure Tunnels
You will explore the encrypted tunnels in RouterOS, including L2TP, L2TP/IPsec, SSTP, and IPsec. You will learn how to configure and secure these tunnels to establish secure connections over public networks, guaranteeing the confidentiality and integrity of the data transmitted.
Chapter 7 - Detailed Tunnels Labs Review
Tunnels Detailed Lab Review is to provide participants with a practical and detailed review of the different types of tunnels available in MikroTik. Through a series of laboratories, the aim is to reinforce and consolidate the knowledge acquired in the course in relation to IPIP, EoIP and PPTP tunnels.
By the end
You will gain the skills and knowledge needed to address network security challenges and become a MikroTik security expert. Prepare to protect your systems effectively and stand out in the field of computer security.
RouterOS v7 Advanced Security Book
Study material for the MTCSE Certification Course, updated to RouterOS v7