SlideShare a Scribd company logo
1 of 6
Download to read offline
Kali Linux / BackBox
MUHAMMAD PAILUS
HADSEC | Jl. Proklamasi, pondonk CC, Depok Sleman, Yogyakarta
HadSec Hadsec Mikrotik
Administrator
1
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
HadSec Mikrotik Administrator
HadSec Mikrotik Administrator dirancang untuk siapa saja yang ingin mempelajari
mikrotik dengan konsep aplikatif. Pada HMA di harapkan peserta mampu merancang
serta mengkonfigurasi jagingan untuk skala kecil menengah, baik itu untuk
perkantoran ataupun bisnis lainnya.s
Semua materi yang ada dalam HadSec Mikrotik Administrator telah di persiapkan
dengan segala bentuk kemungkinan yang ada dilapangan. Yaitu dengan berbagai
pengalaman teknis yang sudah dilakukan selama bertahun-tahun dibidang jaringan
komputer.
Waktu Training: 2 Bulan * Undestand Guaranted
Objectives : Dengan Menyelesaikan training ini diharapkan peserta bisa
melakukan konfigurasi dasar mikrotik serta troubleshoot di skala jaringan kecil
Menengah.
Target Audience: Network engineers and technisi yang mempersiapkan diri untuk:
Course prerequisites: Peserta Harus memahami dengan Baik konsep dari subneting
dan TCP/IP, jika tidak di sarankan mengambil program jaringan basik terlebih dahulu.
2
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
HadSec-MTA[N101]
No Chapter Objective
Introduction Mikrotik
1 Chapter 1 - Apa itu Router Os
2 Chapter 2 - Apa Itu Router Board
3 Chapter 3 - Apa itu licency
Persiapan
5 Chapter 4 - Login router Pertama kali
6 Chapter 5 Cara menggunakan Winbox
7 Chapter 6 Cara menggunakan Router Os via telnet, ssh
8 Chapter 7
Cara Menggunakan webfig
Persiapan
10 Chapter 9 Konfigurasi Via Winboxd
11 Chapter 10
Konfigurasi Via telnet,ssh
12 Chapter 11
Konfigurasi via Webfig
3
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
13 Chapter 12
Konfigurasi From Backup File
Konfigurasi Interface
15 Chapter 14 Mengganti nama interface
12
Chapter 15
Menonaktifkan Interface
16 Chapter 16
Konfigurasi port Switch
17 Chapter 17 Konfigurasi gateway
18 Chapter 18 Mengubah Identity
19 Chapter 19
Konfigurasi NTP Client
20 Chapter 20 Konfigurasi Dns Server
21 Chapter 21 Challenges 1
Monitoring
23 Chapter 23 Arp (Adress Resolution Protokol)
24 Chapter 24 Ip Scan
25 Chapter 25
Mac Scan
26 Chapter 26 Torch
4
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
Firewall
29
Chapter 29 NAT ( Network Address Translation)
30 Chapter 30 Masquearade berdasarkan IP address
31 Chapter 31 Masquerade berdasarkan Waktu
32 Chapter 32 Masquerade berdasarkan Aplikasi
33 Chapter 33 Chain Input
34 Chapter 34
Chain Content
35 Chapter 35 Chain Output
36 Chapter 36 Chain Forward
37 Chapter 37 Action Reject, Drop, Forward
38 Chapter 38 Challenges2
Web Proxy
40 Chapter 40 Perkenalan Proxy
41 Chapter 41
Konfigurasi Dasar Web Proxy
42 Chapter 42
Access Control
5
Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta
43
Chapter 43
Transparent Proxy
44
Chapter 44 External Proxy
45 Chapter 45 Cache Control
46 Chapter 46 Trafic Filtering
47
Chapter 47 Challenges 3
Wireless Network
48 Chapter 48 Wireless Kasus
49 Chapter 49 Konfigurasi Wireless
50 Chapter 50 Konfigurasi DHCP server
51 Chapter 51 Membuat User berdasarkan Profil
52 Chapter 52 Konfigurasi Keamanan
53 Chapter 53 Konfigurasi DHCP server
54 Chapter 54 Monitoring
55 Chapter 55 Membuat User berdasarkan Profil
56
Chapter 56 Mengganti Halaman Login

More Related Content

Viewers also liked

Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Ammar WK
 
Workshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment systemWorkshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment systemDan H
 
Backtrack 5 - web pentest
Backtrack 5 - web pentestBacktrack 5 - web pentest
Backtrack 5 - web pentestDan H
 
Backtrack 5 - network pentest
Backtrack 5 - network pentestBacktrack 5 - network pentest
Backtrack 5 - network pentestDan H
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)Ammar WK
 
bluetooth [in]security
bluetooth [in]securitybluetooth [in]security
bluetooth [in]securityAmmar WK
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationAmmar WK
 
Alur attacking web (sisi client)
Alur attacking web (sisi client)Alur attacking web (sisi client)
Alur attacking web (sisi client)Chandra Zeattacker
 
Wispi: Mini Karma Router For Pentester - Rama Tri Nanda
Wispi: Mini Karma Router For Pentester - Rama Tri NandaWispi: Mini Karma Router For Pentester - Rama Tri Nanda
Wispi: Mini Karma Router For Pentester - Rama Tri Nandaidsecconf
 
Hardware Hacking
Hardware HackingHardware Hacking
Hardware Hackingrngtng
 
Tutorial server ubuntu
Tutorial server ubuntuTutorial server ubuntu
Tutorial server ubuntuJisim Kuring
 
Course lecture - An introduction to the Return Oriented Programming
Course lecture - An introduction to the Return Oriented ProgrammingCourse lecture - An introduction to the Return Oriented Programming
Course lecture - An introduction to the Return Oriented ProgrammingJonathan Salwan
 
CSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open RedirectCSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open RedirectBlueinfy Solutions
 
Debian Packaging tutorial
Debian Packaging tutorialDebian Packaging tutorial
Debian Packaging tutorialnussbauml
 

Viewers also liked (20)

Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008
 
Workshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment systemWorkshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment system
 
Backtrack 5 - web pentest
Backtrack 5 - web pentestBacktrack 5 - web pentest
Backtrack 5 - web pentest
 
Backtrack 5 - network pentest
Backtrack 5 - network pentestBacktrack 5 - network pentest
Backtrack 5 - network pentest
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)
 
bluetooth [in]security
bluetooth [in]securitybluetooth [in]security
bluetooth [in]security
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
 
01.introduction
01.introduction01.introduction
01.introduction
 
Alur attacking web (sisi client)
Alur attacking web (sisi client)Alur attacking web (sisi client)
Alur attacking web (sisi client)
 
Wispi: Mini Karma Router For Pentester - Rama Tri Nanda
Wispi: Mini Karma Router For Pentester - Rama Tri NandaWispi: Mini Karma Router For Pentester - Rama Tri Nanda
Wispi: Mini Karma Router For Pentester - Rama Tri Nanda
 
Hardware Hacking
Hardware HackingHardware Hacking
Hardware Hacking
 
Tutorial server ubuntu
Tutorial server ubuntuTutorial server ubuntu
Tutorial server ubuntu
 
Uji performa kontroler on Semnasteknomedia Amikom 2015
Uji performa kontroler on Semnasteknomedia Amikom 2015Uji performa kontroler on Semnasteknomedia Amikom 2015
Uji performa kontroler on Semnasteknomedia Amikom 2015
 
Introduction to MikroTik RouterOS API
Introduction to MikroTik RouterOS APIIntroduction to MikroTik RouterOS API
Introduction to MikroTik RouterOS API
 
Course lecture - An introduction to the Return Oriented Programming
Course lecture - An introduction to the Return Oriented ProgrammingCourse lecture - An introduction to the Return Oriented Programming
Course lecture - An introduction to the Return Oriented Programming
 
CSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open RedirectCSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open Redirect
 
Mikrotik RouterOS Security Audit Checklist by Akbar Azwir
Mikrotik RouterOS Security Audit Checklist by Akbar AzwirMikrotik RouterOS Security Audit Checklist by Akbar Azwir
Mikrotik RouterOS Security Audit Checklist by Akbar Azwir
 
Pentesting
PentestingPentesting
Pentesting
 
Debian Packaging tutorial
Debian Packaging tutorialDebian Packaging tutorial
Debian Packaging tutorial
 
IPTV Security
IPTV SecurityIPTV Security
IPTV Security
 

Similar to Had sec mikrotik administrator

Mikrotik router
Mikrotik routerMikrotik router
Mikrotik routerAri Fidele
 
Workshop Mikrotik
Workshop MikrotikWorkshop Mikrotik
Workshop MikrotikPutra Wanda
 
Tutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepTutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepAsep Asep
 
Simulasi praktek management bandwidth simpel queue aijtkjgnc
Simulasi praktek management bandwidth simpel queue aijtkjgncSimulasi praktek management bandwidth simpel queue aijtkjgnc
Simulasi praktek management bandwidth simpel queue aijtkjgncAsepSukarya2
 
Prak6-Administrasi Hotspot Mikrotik
Prak6-Administrasi Hotspot MikrotikPrak6-Administrasi Hotspot Mikrotik
Prak6-Administrasi Hotspot MikrotikPutra Wanda
 
Prak8-blok https mikrotik
Prak8-blok https mikrotikPrak8-blok https mikrotik
Prak8-blok https mikrotikPutra Wanda
 
Tutorial mikrotik-step-by-step(1)
Tutorial mikrotik-step-by-step(1)Tutorial mikrotik-step-by-step(1)
Tutorial mikrotik-step-by-step(1)Rudy Yusdiantoro
 
Tutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepTutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepSidiq Dwi Laksana
 
Jobsheet UKK TKJ 2021 - Paket I.pdf
Jobsheet UKK TKJ 2021 - Paket I.pdfJobsheet UKK TKJ 2021 - Paket I.pdf
Jobsheet UKK TKJ 2021 - Paket I.pdfFebiLailia1
 
Mikrotik Router OS - Basic Configuration [Part-1]
Mikrotik Router OS - Basic Configuration [Part-1]Mikrotik Router OS - Basic Configuration [Part-1]
Mikrotik Router OS - Basic Configuration [Part-1]Ratomi Husn
 
Prak9-Bandwith Limiter
Prak9-Bandwith LimiterPrak9-Bandwith Limiter
Prak9-Bandwith LimiterPutra Wanda
 
Prak5-Pengenalan Mikrotik
Prak5-Pengenalan MikrotikPrak5-Pengenalan Mikrotik
Prak5-Pengenalan MikrotikPutra Wanda
 
Pembahasan Soal UKK TKJj 2017 - Paket 2
Pembahasan Soal UKK TKJj 2017 - Paket 2Pembahasan Soal UKK TKJj 2017 - Paket 2
Pembahasan Soal UKK TKJj 2017 - Paket 2Beni Krisbiantoro
 
Konfigurasi router mikrotik lengkap
Konfigurasi router mikrotik lengkapKonfigurasi router mikrotik lengkap
Konfigurasi router mikrotik lengkapMarkus Graphic
 
Tutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepTutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepGien Rockmantic
 
Modul mikrotik-2.8.26
Modul mikrotik-2.8.26Modul mikrotik-2.8.26
Modul mikrotik-2.8.26dede Purnama
 

Similar to Had sec mikrotik administrator (20)

Mikrotik router
Mikrotik routerMikrotik router
Mikrotik router
 
Workshop Mikrotik
Workshop MikrotikWorkshop Mikrotik
Workshop Mikrotik
 
Tutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepTutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-step
 
Simulasi praktek management bandwidth simpel queue aijtkjgnc
Simulasi praktek management bandwidth simpel queue aijtkjgncSimulasi praktek management bandwidth simpel queue aijtkjgnc
Simulasi praktek management bandwidth simpel queue aijtkjgnc
 
Prak6-Administrasi Hotspot Mikrotik
Prak6-Administrasi Hotspot MikrotikPrak6-Administrasi Hotspot Mikrotik
Prak6-Administrasi Hotspot Mikrotik
 
Al12
Al12Al12
Al12
 
Materi Seting Mikrotik
Materi Seting MikrotikMateri Seting Mikrotik
Materi Seting Mikrotik
 
Prak8-blok https mikrotik
Prak8-blok https mikrotikPrak8-blok https mikrotik
Prak8-blok https mikrotik
 
LAPORAN UKK ADI.pdf
LAPORAN UKK ADI.pdfLAPORAN UKK ADI.pdf
LAPORAN UKK ADI.pdf
 
Tutorial mikrotik-step-by-step(1)
Tutorial mikrotik-step-by-step(1)Tutorial mikrotik-step-by-step(1)
Tutorial mikrotik-step-by-step(1)
 
Tutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepTutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-step
 
Jobsheet UKK TKJ 2021 - Paket I.pdf
Jobsheet UKK TKJ 2021 - Paket I.pdfJobsheet UKK TKJ 2021 - Paket I.pdf
Jobsheet UKK TKJ 2021 - Paket I.pdf
 
Ebook-MTCTCE.pdf
Ebook-MTCTCE.pdfEbook-MTCTCE.pdf
Ebook-MTCTCE.pdf
 
Mikrotik Router OS - Basic Configuration [Part-1]
Mikrotik Router OS - Basic Configuration [Part-1]Mikrotik Router OS - Basic Configuration [Part-1]
Mikrotik Router OS - Basic Configuration [Part-1]
 
Prak9-Bandwith Limiter
Prak9-Bandwith LimiterPrak9-Bandwith Limiter
Prak9-Bandwith Limiter
 
Prak5-Pengenalan Mikrotik
Prak5-Pengenalan MikrotikPrak5-Pengenalan Mikrotik
Prak5-Pengenalan Mikrotik
 
Pembahasan Soal UKK TKJj 2017 - Paket 2
Pembahasan Soal UKK TKJj 2017 - Paket 2Pembahasan Soal UKK TKJj 2017 - Paket 2
Pembahasan Soal UKK TKJj 2017 - Paket 2
 
Konfigurasi router mikrotik lengkap
Konfigurasi router mikrotik lengkapKonfigurasi router mikrotik lengkap
Konfigurasi router mikrotik lengkap
 
Tutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-stepTutorial mikrotik-step-by-step
Tutorial mikrotik-step-by-step
 
Modul mikrotik-2.8.26
Modul mikrotik-2.8.26Modul mikrotik-2.8.26
Modul mikrotik-2.8.26
 

Had sec mikrotik administrator

  • 1. Kali Linux / BackBox MUHAMMAD PAILUS HADSEC | Jl. Proklamasi, pondonk CC, Depok Sleman, Yogyakarta HadSec Hadsec Mikrotik Administrator
  • 2. 1 Hadsec.com Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta HadSec Mikrotik Administrator HadSec Mikrotik Administrator dirancang untuk siapa saja yang ingin mempelajari mikrotik dengan konsep aplikatif. Pada HMA di harapkan peserta mampu merancang serta mengkonfigurasi jagingan untuk skala kecil menengah, baik itu untuk perkantoran ataupun bisnis lainnya.s Semua materi yang ada dalam HadSec Mikrotik Administrator telah di persiapkan dengan segala bentuk kemungkinan yang ada dilapangan. Yaitu dengan berbagai pengalaman teknis yang sudah dilakukan selama bertahun-tahun dibidang jaringan komputer. Waktu Training: 2 Bulan * Undestand Guaranted Objectives : Dengan Menyelesaikan training ini diharapkan peserta bisa melakukan konfigurasi dasar mikrotik serta troubleshoot di skala jaringan kecil Menengah. Target Audience: Network engineers and technisi yang mempersiapkan diri untuk: Course prerequisites: Peserta Harus memahami dengan Baik konsep dari subneting dan TCP/IP, jika tidak di sarankan mengambil program jaringan basik terlebih dahulu.
  • 3. 2 Hadsec.com Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta HadSec-MTA[N101] No Chapter Objective Introduction Mikrotik 1 Chapter 1 - Apa itu Router Os 2 Chapter 2 - Apa Itu Router Board 3 Chapter 3 - Apa itu licency Persiapan 5 Chapter 4 - Login router Pertama kali 6 Chapter 5 Cara menggunakan Winbox 7 Chapter 6 Cara menggunakan Router Os via telnet, ssh 8 Chapter 7 Cara Menggunakan webfig Persiapan 10 Chapter 9 Konfigurasi Via Winboxd 11 Chapter 10 Konfigurasi Via telnet,ssh 12 Chapter 11 Konfigurasi via Webfig
  • 4. 3 Hadsec.com Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta 13 Chapter 12 Konfigurasi From Backup File Konfigurasi Interface 15 Chapter 14 Mengganti nama interface 12 Chapter 15 Menonaktifkan Interface 16 Chapter 16 Konfigurasi port Switch 17 Chapter 17 Konfigurasi gateway 18 Chapter 18 Mengubah Identity 19 Chapter 19 Konfigurasi NTP Client 20 Chapter 20 Konfigurasi Dns Server 21 Chapter 21 Challenges 1 Monitoring 23 Chapter 23 Arp (Adress Resolution Protokol) 24 Chapter 24 Ip Scan 25 Chapter 25 Mac Scan 26 Chapter 26 Torch
  • 5. 4 Hadsec.com Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta Firewall 29 Chapter 29 NAT ( Network Address Translation) 30 Chapter 30 Masquearade berdasarkan IP address 31 Chapter 31 Masquerade berdasarkan Waktu 32 Chapter 32 Masquerade berdasarkan Aplikasi 33 Chapter 33 Chain Input 34 Chapter 34 Chain Content 35 Chapter 35 Chain Output 36 Chapter 36 Chain Forward 37 Chapter 37 Action Reject, Drop, Forward 38 Chapter 38 Challenges2 Web Proxy 40 Chapter 40 Perkenalan Proxy 41 Chapter 41 Konfigurasi Dasar Web Proxy 42 Chapter 42 Access Control
  • 6. 5 Hadsec.com Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta 43 Chapter 43 Transparent Proxy 44 Chapter 44 External Proxy 45 Chapter 45 Cache Control 46 Chapter 46 Trafic Filtering 47 Chapter 47 Challenges 3 Wireless Network 48 Chapter 48 Wireless Kasus 49 Chapter 49 Konfigurasi Wireless 50 Chapter 50 Konfigurasi DHCP server 51 Chapter 51 Membuat User berdasarkan Profil 52 Chapter 52 Konfigurasi Keamanan 53 Chapter 53 Konfigurasi DHCP server 54 Chapter 54 Monitoring 55 Chapter 55 Membuat User berdasarkan Profil 56 Chapter 56 Mengganti Halaman Login