0% found this document useful (0 votes)
264 views3 pages

MTCSE Outline

The 2-day Certified Security Engineer (MTCSE) training course aims to teach network engineers and technicians how to securely deploy and maintain MikroTik device-based networks. The course covers topics such as attacks and threats, firewall configuration, OSI layer attacks and prevention, cryptography, securing the router, and secure tunnels. It consists of 6 modules that combine lectures with hands-on laboratory exercises to help participants learn how to plan and implement appropriate security measures for networks.

Uploaded by

predi senior
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
264 views3 pages

MTCSE Outline

The 2-day Certified Security Engineer (MTCSE) training course aims to teach network engineers and technicians how to securely deploy and maintain MikroTik device-based networks. The course covers topics such as attacks and threats, firewall configuration, OSI layer attacks and prevention, cryptography, securing the router, and secure tunnels. It consists of 6 modules that combine lectures with hands-on laboratory exercises to help participants learn how to plan and implement appropriate security measures for networks.

Uploaded by

predi senior
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Last edited on March 22, 2019

Certified Security Engineer (MTCSE)


Training outline

Duration: 2 days
Outcomes: By the end of this training session, the participant will
be able to plan and implement appropriate security
measures suitable for the network at hand.
Target audience: Network engineers and technicians wanting to deploy
and maintain secure MikroTik device based networks.
Course prerequisites: MTCNA certificate

1
Last edited on March 22, 2019

Title Objective
• Attacks, mechanisms and services
Module 1
Introduction • The most common threats
• RouterOS security deployment
• Module 1 laboratory

• Packet flow, firewall chains


Module 2
Firewall • Stateful firewall
• RAW table
• SYN flood mitigation using RAW table
• RouterOS default configuration
• Best practices for management access
• Detecting an attack to critical infrastructure services
• Bridge filter
• Advanced options in firewall filter
• ICMP filtering
• Module 2 laboratory

• MNDP attacks and prevention


Module 3
OSI Layer Attacks • DHCP: rogue servers, starvation attacks and prevention
• TCP SYN attacks and prevention
• UDP attacks and prevention
• ICMP Smurf attacks and prevention
• FTP, telnet and SSH brute-force attacks and prevention
• Port scan detection and prevention
• Module 3 laboratory

• Introduction to cryptography and terminology


Module 4
Cryptography • Encryption methods
• Algorithms - symmetric, asymmetric
• Public key infrastructure (PKI)
• Certificates
• Self-signed certificates
• Free of charge valid certificates
• Using the certificates in RouterOS
• Module 4 laboratory

2
Last edited on March 22, 2019

• Port knocking
Module 5
Securing the • Secure connections (HTTPS, SSH, WinBox)
Router • Default ports for the services
• Tunneling through SSH
• Module 5 laboratory

• Introduction to IPsec
Module 6
Secure Tunnels • L2TP + IPsec
• SSTP with certificates
• Module 6 laboratory

You might also like