MikroTik Certfied
Security Engineer
MTCSE Contenido
-
Attacks, mechanisms and services
-
The most common threats
-
RouterOS security deployment
-
Packet flow, firewall chains
-
Stateful firewall
-
RAW table
-
SYN flood mitigation using RAW table
-
RouterOS default configuration
-
Best practices for management access
-
Detecting an attack to critical infrastructure services
-
Bridge filter
-
Advanced options in firewall filter
-
ICMP filtering
-
MNDP attacks and prevention
-
DHCP: rogue servers, starvation attacks and prevention
-
TCP SYN attacks and prevention
-
UDP attacks and prevention
-
ICMP Smurf attacks and prevention
-
FTP, telnet and SSH brute-force attacks and prevention
-
Port scan detection and prevention
-
Introduction to cryptography and terminology
-
Encryption methods
-
Algorithms – symmetric, asymmetric
-
Public key infrastructure (PKI)
-
Certificates
-
Self-signed certificates
-
Free of charge valid certificates
-
Using the certificates in RouterOS
-
Port knocking
-
Secure connections (HTTPS, SSH, WinBox)
-
Default ports for the services
-
Tunneling through SSH
-
Introduction to IPsec
-
L2TP + IPsec
-
SSTP with certificates