Study Learn Grow
Metasploit Unleashed: Build Defense Against Complex Attacks

Metasploit Unleashed: Build Defense Against Complex Attacks


In this course, you will use a powerful VM called Metasploitable which is a vulnerable version of Linux for Metasploit.

Overview

Description
Add superior end-to-end security to your network using Metasploit

Metasploit is a platform for testing, executing, and exploiting computer systems using a modular framework. It is used to create security testing tools and exploit modules and also as a penetration testing system. In this course, you will use a powerful VM called Metasploitable which is a vulnerable version of Linux for Metasploit. You will begin with setting up of the Metasploit architecture and get familiar with Meterpreter commands, and using these to launch payloads and interact with exploited systems. You will use Metasploit as a vulnerability scanner, leveraging tools such as NMap and Nessus and then work on real-world sophisticated scenarios in which performing penetration tests is a challenge. You will go on a journey through client-side and server-side attacks using Metasploit and various scripts built on the Metasploit framework. Then you will establish foothold on the network by staying hidden, and pivoting to other systems. Finally, you will carry out a cyber attack using Armitage, a GUI-based tool. By the end of the course, you will get well versed with Metasploit modules, exploiting systems, carrying out breaches, as well as building and porting exploits of various kinds in Metasploit. There is something for everyone from the beginner to experienced practitioner looking to broaden their knowledge. No prior knowledge of Metasploit is assumed.

About the Author

Shane Hartman, Founder and Executive Director of SpecterLabs. With over 20 years of IT experience ranging from network engineering to enterprise security, His experience gives him a broad understanding security needs facing the IT industry today. He has a masters degree in digital forensics and currently teaches forensics, enterprise security, and offensive computing at the collegiate level.

Course Information

No prior knowledge of Metasploit is assumed

Understand Metasploit and the Metasploit commands used in the command line interface
Exploit commands: set to set variables and show to show the exploit options, targets, payloads, encoders, nops and the evasion options
Meterpreter commands to get you started and help familiarize you with this most powerful tool
Use of Metasploit as a vulnerability scanner leveraging tools such as NMap and Nessus
Use Pivoting for routing traffic from a normally non-routable network
Perform test services such as SCADA, and test in a highly secured environment
Simulate attacks on web servers and systems with Armitage

This course is a primer for the use of Metasploit. Designed for people interested in system security and pentesting using the Metasploit framework. There is something for everyone from the beginner to experienced practitioner looking to broaden their knowledge.

• Lifetime Access to Each Course
• Certificate on Completion of Course
• No Extra Charges Or Admin Fees
• Easy Access to Courses
• High Priority Support After Sales.
• Big Discounts on Individual Courses

Course Specifications

IT and Computing courses are available to study on our learning platform. 

See All Courses

Adult education is the non-credential activity of gaining skills and improved education. 

See All Courses

Online education is electronically supported learning that relies on the Internet for teacher/student interaction. 

See All Courses

A short course is a learning programme that gives you combined content or specific skills training in a short period of time. Short courses often lean towards the more practical side of things and have less theory than a university course – this gives you a more hands-on experience within your field of interest.

See All Courses

Course duration is 24 hours.

See All Courses

Study Learn Grow

Related Jobs