MikroTik Value Added Distributor, MikroTik Training Centre, MikroTik Toronto, MikroTik Canada

MikroTik Value Added Distributor, MikroTik Training Centre, MikroTik Toronto, MikroTik Canada

MikroTik Training Centre, Toronto, Canada MikroTik Value Added Distributor

T (647) 477-0163
Email: support@wirelessnetware.ca

Wireless Netware Technology LTD.
550 Alden Road, Unti# 210A, Markham, Ontario L3R6A8

Open in Google Maps
  • Home
  • Solutions
  • Services
  • Become a Canadian ISP
    • Business Internet
  • Partners
  • Hardware
  • Training
  • Blog
  • About
  • Contacts
MikroTikSupport
  • Home
  • Blog
  • Blog
  • MikroTik Training
Thursday, 09 March 2017 / Published in Blog

MikroTik Training

General Information

  • Wireless Netware is one of the MikroTik Training Centers (MTC) located in Toronto Canada, we are a separate entity conducting intensive public or private training sessions and certification tests according to the official MikroTik Training Outline. MTC’s are not affiliated with each other and with MikroTik in any form. We use our own training materials and bear sole responsibility for the training sessions offered.

Check certificate 

  • Use “check certificate” URL if  you/your organization would be applying for a Canada Job Grant. For the application, they require the name of the person “Hani Rahrouh, MikroTik Certified Training Partner” who provides MikroTik official training courses.

Become a consultant

  • It’s simple, if you have MTCNA (score 75%+) and at least one valid MikroTik Engineer level certificate (MTCRE, MTCWE, MTCTCE, MTCUME or MTCINE) with score 75%+, apply by email with your mikrotik.com account name and fields of expertise, and we will add you to the list. To stay in the consultant list, you will have to have valid certificates, participate in the MikroTik Forum and attend the MUM events in your country conducting RouterOS case studies or workshops for rest of attendees.

Benefit

  • Companies who are looking for MikroTik Certified partners may contact MikroTik Consultants. You would be hired as a knowledgeable in networking to provide MikroTik RouterOS support and offer private training, help in designing network infrastructure, troubleshooting, specific setup of VPN, bandwidth shaping, and so on.

How to become a training partner?

  • To become a Training Partner, send an e-mail to training@mikrotik.com. Please let us know what course do you plan to deliver, how is the training class going to be organized, class setup, how many days, what equipment is going to be provided, what is going to be included into the curriculum, who is going to be the trainer, what is his/her previous experience teaching IT in general and data networking particularly. MikroTik is offering Train-the-Trainer classes for those who want to become MikroTik Trainers. Training Partner rating and student results are calculated from the results and feedback collected within the last year.

What you can read next

MikroTik RouterBOARDs
MikroTik Newsletter #2018-9, August 9, 2018
MikroTik News August 2017 (Issue #77)

Recent Posts

  • Load-balance using PCC in MikroTik RouterOS v 6.xx

    Introduction PCC “Per Connection Classifi...
  • Audience – a router for those who value both beauty and functionality

    Audience is a tri-band (2.4 GHz & high + lo...
  • DO NOT let the cables limit you, More Throughput over Power!

    PWR-LINE PRO PWR-LINE PRO (PL7510Gi) is a smart...
  • The First MikroTik product with 10G RJ45 Ethernet ports, CRS312-4C+8XG-RM

    CRS312-4C+8XG-RM Switch of the future: the firs...
  • Netflix has identified vulnerabilities in RouterOS.

    Netflix has identified several TCP networking v...

RSS MikroTik Blog

  • CVE-2023-30799
    A new CVE has been published, which describes a policy elevation issue, where a logged in administrator with "policy" permissions (able to grant additional permissions to any user on the router), is also able to send crafted configuration commands, that are exchanged internally by the router software components and normally…
  • CVE-2023-32154
    On 10/05/2023 (May 10th, 2023) MikroTik received information about a new vulnerability, which is assigned the ID CVE-2023-32154. The report stated, that vendor (MikroTik) was contacted in December, but we did not find record of such communication. The original report also says, that vendor was informed in person in an…
  • Mēris botnet
    In early September 2021 QRATOR labs published an article about a new wave of DDoS attacks, which are originating from a botnet involving MikroTik devices.  As far as we have seen, these attacks use the same routers that were compromised in 2018, when MikroTik RouterOS had a vulnerability, that…
  • Fragattacks
    In beginning of May  2021, a security research group from Belgium published a set of vulnerabilities they call "Frag Attacks" (from Fragmentation Attack), which affect all modern security protocols of Wi-Fi. Not all the published issues affect MikroTik products, but those that were found to be potentially affecting RouterOS, have…
  • Upgraded package signatures
    The RouterOS package signing procedure has been upgraded, to use new algorithms and utilize state of the art security hardware. It  will also add a possibility to verify the integrity of existing installations. The new updated package signing procedure provides additional security to prevent installation of malicious software. Best security practices: Keep RouterOS updated…
  • MUM EUROPE AND OTHER UPCOMING EVENTS - POSTPONED!
    In compliance with our commitment to ensure the safety of our clients, partners, staff, and visitors at all MikroTik events, we have no other choice but to postpone our upcoming events: MUM Europe in Prague, Czech Republic (March 26-27) MTCSA in Riga, Latvia (March 23-24) Train the Trainer in Riga, Latvia (March 30…
  • DNS cache poisoning vulnerability
    Tenable has identified a vulnerability in RouterOS DNS implementation. RouterOS 6.45.6 and below is vulnerable to unauthenticated remote DNS cache poisoning via Winbox. The router is impacted even when DNS is not enabled. One possible attack vector is via Winbox on port 8291 if this port is open to untrusted networks.…
  • Package validation and upgrade vulnerability
    Tenable has identified a couple of issues with RouterOS packaging and upgrade systems. The upgrade system used by RouterOS 6.45.5 and below is vulnerable to man in the middle attacks and insufficient package validation. An attacker can abuse these vulnerabilities to downgrade a router's installed RouterOS version, possibly lock the…
  • CVE-2019-11477, CVE-2019-11478, CVE-2019-11479
    Summary Netflix has identified several TCP networking vulnerabilities in the Linux kernel that is used in RouterOS. The vulnerabilities can trigger denial of service if the RouterOS system is attacked from an insufficiently protected network interface (port). Firewall can protect against the issue. MikroTik has already applied the necessary patches: fix included in…
  • CVE-2019-3981
    Summary Tenable has published a potential vulnerability in older RouterOS versions where an attacker can retrieve the password hash of a RouterOS username via a complex man-in-the-middle attack over port 8291. The attacker must be able to intercept a valid RouterOS user login attempt, so he must be located in the…

General information

MikroTik Training Schedules
My Certificate Validation
Who is my local MikroTik Consultant
How to become a MikroTik Consultant
How to become a MikroTik Certified Trainer

Useful URLs

MikroTik Distributor
MikroTik WiKi "Documentation"
MikroTik useful Articles and Examples
The Dude "Monitoring, Notification, Syslog"
User Manager "Free Radius Server"

Legal

  • Privacy Policy
  • General Term
  • Training terms
  • Managed Services Terms
  • Partner term
  • GET SOCIAL
MikroTik Value Added Distributor, MikroTik Training Centre, MikroTik Toronto, MikroTik Canada

Copyright © 2015 WirelessNetware. All rights reserved.

TOP