FileMood

Download MikroTik Security Engineer with LABS

MikroTik Security Engineer with LABS

Name

MikroTik Security Engineer with LABS

 DOWNLOAD Copy Link

Total Size

12.5 GB

Total Files

135

Last Seen

2024-09-06 23:46

Hash

AA30325C06ADA0581528A2695D9BFE47E8B6E11F

/1. Disable unnecessary protocols on the MikroTik Router/

1. What are the unnecessary protocols.mp4

29.3 MB

1. What are the unnecessary protocols.srt

2.0 KB

2. Turn off unnecessary packages, scan for open protocols and disable them.mp4

298.0 MB

2. Turn off unnecessary packages, scan for open protocols and disable them.srt

21.4 KB

3. Protect the access on the Mikrotik Router using SSH and Winbox.mp4

278.4 MB

3. Protect the access on the Mikrotik Router using SSH and Winbox.srt

16.1 KB

/2. Protecing MikroTik Logins with Port Knocking/

1. Introduction - Protecing MikroTik Login with Port Knocking.mp4

46.9 MB

1. Introduction - Protecing MikroTik Login with Port Knocking.srt

3.0 KB

2. Configuring MikroTik Port Knocking - Part1.mp4

244.2 MB

2. Configuring MikroTik Port Knocking - Part1.srt

21.4 KB

3. Configuring MikroTik Port Knocking - Part2.mp4

243.3 MB

3. Configuring MikroTik Port Knocking - Part2.srt

19.5 KB

/3. Get the right people to login into your MikroTik Router/

1. Introduction - User Management in MikroTik.mp4

35.0 MB

1. Introduction - User Management in MikroTik.srt

2.3 KB

2. User Management on Mikrotik.mp4

282.7 MB

2. User Management on Mikrotik.srt

26.4 KB

3. Allowing user login on a time interval.mp4

155.6 MB

3. Allowing user login on a time interval.srt

13.3 KB

/4. LockDown the Mikrotik Router - Disable unnecessary tools/

1. Disable MAC Winbox, MAC Ping & neighbor discovery.mp4

322.6 MB

1. Disable MAC Winbox, MAC Ping & neighbor discovery.srt

24.8 KB

2. Disable Bandwith Test and Romon tools.mp4

136.4 MB

2. Disable Bandwith Test and Romon tools.srt

10.7 KB

/5. DHCP attacks and Prevention/

1. Preventing DHCP Starvation attack.mp4

389.8 MB

1. Preventing DHCP Starvation attack.srt

33.1 KB

2. Protect your network with DHCP Snooping to avoid DHCP rogue server.mp4

309.9 MB

2. Protect your network with DHCP Snooping to avoid DHCP rogue server.srt

27.6 KB

/6. How the packets flow in MikroTik/

1. Introduction to Packet flow on Mikrotik.mp4

49.0 MB

1. Introduction to Packet flow on Mikrotik.srt

3.2 KB

2. How to read the MikroTik Packet Flow sheet.mp4

220.1 MB

2. How to read the MikroTik Packet Flow sheet.srt

20.8 KB

3. MikroTik Packet flow - Examples.mp4

182.3 MB

3. MikroTik Packet flow - Examples.srt

17.4 KB

/7. Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)/

1. Introduction to the MikroTik Firewall.mp4

36.5 MB

1. Introduction to the MikroTik Firewall.srt

2.4 KB

10. Block Bogon IP addresses on MikroTik Firewall.mp4

130.2 MB

10. Block Bogon IP addresses on MikroTik Firewall.srt

11.6 KB

10.1 Bogon address-list.txt.txt

0.6 KB

11. Drop port scan attacks using the MikroTik firewall.mp4

248.4 MB

11. Drop port scan attacks using the MikroTik firewall.srt

23.6 KB

12. Block Syn Flood and DDOS using the MikroTik Firewall.mp4

326.5 MB

12. Block Syn Flood and DDOS using the MikroTik Firewall.srt

25.3 KB

13. Use MikroTik RAW firewall to protect your network.mp4

153.1 MB

13. Use MikroTik RAW firewall to protect your network.srt

13.4 KB

14. Preventing UDP Flood Attack.mp4

373.6 MB

14. Preventing UDP Flood Attack.srt

28.9 KB

14.1 UDP Flood attack (Kali Linux).txt.txt

0.1 KB

15. MNDP Attacks Prevention.mp4

269.0 MB

15. MNDP Attacks Prevention.srt

22.7 KB

16. Redirect DNS traffic to the router’s DNS.mp4

203.9 MB

16. Redirect DNS traffic to the router’s DNS.srt

16.4 KB

17. Changing the destination address using Dst-nat.mp4

128.2 MB

17. Changing the destination address using Dst-nat.srt

10.7 KB

18. Use Mangle to mark connections and packets.mp4

292.9 MB

18. Use Mangle to mark connections and packets.srt

24.4 KB

19. Use Mangle Hide your router IP address when doing traceroute.mp4

122.4 MB

19. Use Mangle Hide your router IP address when doing traceroute.srt

10.5 KB

2. Overview of the Firewall on the MikroTik RouterOS.mp4

310.2 MB

2. Overview of the Firewall on the MikroTik RouterOS.srt

25.6 KB

3. What is the function of the Connection Tracking on the MikroTik Router.mp4

209.2 MB

3. What is the function of the Connection Tracking on the MikroTik Router.srt

18.7 KB

4. What are the connection states availble on the MikroTik RouterOS.mp4

147.9 MB

4. What are the connection states availble on the MikroTik RouterOS.srt

13.7 KB

5. Protect your MikroTik router using connection state in the Firewall.mp4

344.2 MB

5. Protect your MikroTik router using connection state in the Firewall.srt

28.6 KB

6. Brute Force attack and Prevention.mp4

493.9 MB

6. Brute Force attack and Prevention.srt

38.7 KB

6.1 Brute Force attack Prevention.txt.txt

1.8 KB

7. Use the Firewall to Protect your MikroTik router from PingICMP flood.mp4

260.6 MB

7. Use the Firewall to Protect your MikroTik router from PingICMP flood.srt

21.5 KB

8. Accept important ICMP types in your MikroTik Firewall.mp4

356.9 MB

8. Accept important ICMP types in your MikroTik Firewall.srt

29.9 KB

8.1 ICMP Type Numbers.docx.docx

11.8 KB

9. Preventing ICMP Smurf Attack.mp4

204.3 MB

9. Preventing ICMP Smurf Attack.srt

16.2 KB

9.1 ICMP Smurf attack (Kali Linux).txt.txt

0.1 KB

/8. Encrypted Tunnels on RouterOS/

1. Introduction to VPN.mp4

21.8 MB

1. Introduction to VPN.srt

1.5 KB

2. What is VPN and why is it important to use it in our network.mp4

267.5 MB

2. What is VPN and why is it important to use it in our network.srt

22.8 KB

3. L2TPIPSEC Tunneling protocol - Explanation.mp4

119.0 MB

3. L2TPIPSEC Tunneling protocol - Explanation.srt

9.3 KB

4. Configuring L2TP site to site VPN (wo IPSEC).mp4

379.1 MB

4. Configuring L2TP site to site VPN (wo IPSEC).srt

32.5 KB

5. Configuring L2TPIPSEC client to site VPN.mp4

169.5 MB

5. Configuring L2TPIPSEC client to site VPN.srt

15.6 KB

6. SSTP Tunneling Protocol - Explanation.mp4

130.0 MB

6. SSTP Tunneling Protocol - Explanation.srt

11.6 KB

7. Configuring SSTP site to site VPN (without certificates).mp4

226.1 MB

7. Configuring SSTP site to site VPN (without certificates).srt

19.6 KB

8. Configuring SSTP site to site VPN (with Certificates).mp4

339.0 MB

8. Configuring SSTP site to site VPN (with Certificates).srt

29.4 KB

9. Configuring SSTP client to site VPN.mp4

264.7 MB

9. Configuring SSTP client to site VPN.srt

22.2 KB

/9. Internet Protocol Security (IPSEC) Framework/

1. What is IPSEC - Intro.mp4

37.3 MB

1. What is IPSEC - Intro.srt

2.3 KB

10. IPSEC Negotiation Protocols (AH vs ESP).mp4

128.0 MB

10. IPSEC Negotiation Protocols (AH vs ESP).srt

11.8 KB

11. IPSEC Negotiation Process - Introduction.mp4

22.9 MB

11. IPSEC Negotiation Process - Introduction.srt

1.6 KB

12. IPSEC Negotiation Process and choices of IPSEC interesting traffic.mp4

137.8 MB

12. IPSEC Negotiation Process and choices of IPSEC interesting traffic.srt

13.2 KB

13. IPSEC IKE Phase 1 (ISAKMP Tunnel).mp4

132.0 MB

13. IPSEC IKE Phase 1 (ISAKMP Tunnel).srt

12.4 KB

14. IPSEC IKE Phase 1 (Main vs Aggressive mode).mp4

93.6 MB

14. IPSEC IKE Phase 1 (Main vs Aggressive mode).srt

8.2 KB

15. IPSEC IKE Phase 2 (IPSEC Tunnel).mp4

113.1 MB

15. IPSEC IKE Phase 2 (IPSEC Tunnel).srt

10.0 KB

16. IPSEC Data Transfer.mp4

48.8 MB

16. IPSEC Data Transfer.srt

4.3 KB

17. Difference between IKEv1 and IKEv2.mp4

90.8 MB

17. Difference between IKEv1 and IKEv2.srt

8.3 KB

18. Introduction to the IPSEC LAB.mp4

33.7 MB

18. Introduction to the IPSEC LAB.srt

2.4 KB

19. Pre-configuration of the IPSEC Tunnel.mp4

249.7 MB

19. Pre-configuration of the IPSEC Tunnel.srt

22.7 KB

2. What is IPSEC - Explanation.mp4

139.9 MB

2. What is IPSEC - Explanation.srt

12.9 KB

20. Configuring site-to-site IPSEC tunnel using IKEv1 & IKEv2 - Part1.mp4

314.2 MB

20. Configuring site-to-site IPSEC tunnel using IKEv1 & IKEv2 - Part1.srt

31.3 KB

21. Configuring site-to-site IPSEC tunnel using IKEv1 & IKEv2 - Part2.mp4

107.1 MB

21. Configuring site-to-site IPSEC tunnel using IKEv1 & IKEv2 - Part2.srt

10.5 KB

3. IPSEC Protocol suite explained.mp4

80.6 MB

3. IPSEC Protocol suite explained.srt

7.8 KB

4. IPSEC modes of communication - Transport vs Tunnel mode.mp4

127.6 MB

4. IPSEC modes of communication - Transport vs Tunnel mode.srt

12.0 KB

5. Types of Encryption - Symmetric vs Asymmetric.mp4

96.0 MB

5. Types of Encryption - Symmetric vs Asymmetric.srt

9.5 KB

6. Security over the internet using IPSEC.mp4

238.9 MB

6. Security over the internet using IPSEC.srt

21.2 KB

7. Encyption Protocols (DES - 3DES- AES - Blowfish - Camellia - RSA - DH).mp4

242.6 MB

7. Encyption Protocols (DES - 3DES- AES - Blowfish - Camellia - RSA - DH).srt

22.7 KB

8. Data Integrity - Hashing Algorithms (MD5 - SHA1 - SHA256 - SHA512).mp4

139.9 MB

8. Data Integrity - Hashing Algorithms (MD5 - SHA1 - SHA256 - SHA512).srt

12.5 KB

9. IPSEC Authentication (Pre-shared key vs Certificates).mp4

132.0 MB

9. IPSEC Authentication (Pre-shared key vs Certificates).srt

12.8 KB

 

Total files 135


Copyright © 2024 FileMood.com