Bangladesh on May 12, 2018

Agenda for MUM in Bangladesh, MAY 2018

updated on 2018-05-17 09:19:18 GMT+03:00


May 11, Friday

Time Presentation Files Video
17:00 MUM Pre-registration, Room - MALLIKA, Free soft drinks by Mikrotik - -

May 12, Saturday

Time Presentation Files Video
08:00 Check-in and Exhibitor hall opens. Bring your printed tickets - -
10:00 Opening and introduction, new products by Sergejs Boginskis (MikroTik, Latvia) presentation file presentation video
10:45 Some Networking Problems in Bangladesh, Solutions & Expectations from MikroTik by Syed Abu Saleh (SASTECH LIMITED, Bangladesh) presentation file presentation video
11:30 Preventing Traffic with Spoofed Source IP Addresses in MikroTik by Md. Abdullah Al Naser (MetroNet Bangladesh Ltd, Bangladesh) presentation file presentation video
12:15 MikroTik switches what's new since 6.41, configuration tips and tricks by Sergejs Boginskis (MikroTik, Latvia) presentation file presentation video
13:00 8 types of Link Redundancy and 35 Network Security tips by A.K.M. Jahangir (Bijoy Online Ltd, Bangladesh) presentation file presentation video
13:30 Lunch - -
15:00 Monitoring Large Scale Network by The Dude by Abdul Kader Linkon (Network Engineer Fareast Islami Life Insurance Company Ltd) presentation file presentation video
15:30 Basic MikroTik Router’s Security by Titas Sarker (Titas Kumer Sarker, Bangladesh) presentation file presentation video
16:00 System and Network Security (MikroTik as a Firewall) by Tayab Khan (Ict Solutions Bangladesh, Bangladesh) - presentation video
16:30 ISP setup with mikrotik and bandwidth limit in bridge mode by Md.Abdur Rob Miah (AlwaysOn Network, Bangladesh) presentation file presentation video
17:15 The Dude - Proactive monitoring by Kazi Ahsanuzzaman (Ribbon Technology, Bangladesh) - presentation video
17:30 Raffle and closing of MUM - -
18:00 Afternoon soft drinks and socializing by MikroTik - -

Speaker Profiles and Presentation Abstracts

Some Networking Problems in Bangladesh, Solutions & Expectations from MikroTik

Mr. Syed Abu Saleh is first MikroTik Certified Trainer from Bangladesh. He has 20 years working experience on Networking & ISP. He will present some MikroTik related networking problems which are facing in Bangladesh. How can we solve those problems. Some Expectations from MikroTik.

8 types of Link Redundancy and 35 Network Security tips

I want to give a very important presentation for all IT managers on 8 types of link redundancy with mikrotik and 35 types of network security using mikrotik. I am listed mikrotik consultant from 2007. and working as network administrator of Bijoy Online Ltd, which is one of the largest ISP in Bangladesh.

Basic MikroTik Router’s Security

Firstly I will discuss about reason for security.
Then slides will be how to secure our network? Here will discuss about those-
1. Administrative Users credentials
2. Winbox default ports
3. MAC binding
4. Site restriction
5. Virus port filtering
6. Log server
Finally will share how to configure those.

System and Network Security (MikroTik as a Firewall)

Dear Concern,

Last MUM Bangladesh I Presented "Priority Based Traffic Shaping by MikroTik" and have got lots of good responses. Hope, this event ( MUM Bangladesh 2018) will be successful.
This Presentation "System and Network Security (MikroTik as a Firewall)" will help our local IT community strongly to build security related awareness, how to use MikroTik as a firewall and my presentation will cover bellow topics

Why MikroTik ?
Security ? Router Security ? System and Network Security ?
Firewall ? How to ensure Router Security ?
DoS, DDoS ? Why DDoS ?
How to Stop DDoS Attacks ?
Black Hole Server, BCP 38 ?
由Mikro拒绝服务(DoS)攻击的保护Tik
Mail Spammer detect by MikroTik.
Examples with Configuration


Regards,
Tayab Khan
BSC in CSE, MSC from JU,
MCP, CCNA, CCNP, CCNSP, JNCIA, JNCIS-SEC,
DGM, Head of Technical Operations
Paradise Premium Group.
Cell: +8801914035805
Email: tayab@tayabkhan.com
Web: http://www.tayabkhan.com/

ISP setup with mikrotik and bandwidth limit in bridge mode

Want to show how to setup a professional ISP and control the bw in bridge system between core and distribution.

The Dude - Proactive monitoring

Introduction
Features
Modes of Operation
Interface Layout
Logs
Probes
Snapshots
Pros. & Cons.
Proactive Notification
LAB
Conclusion
References


Baidu
map