Metasploit Essential Training
Offered By: LinkedIn Learning
Course Description
Overview
Leverage the core functionalities of the Metasploit framework for information gathering, vulnerability scanning, and client-side and post-exploitation activities and management.
Syllabus
Introduction
- The essentials of Metasploit
- What you should know
- What is Metasploit?
- Why use Metasploit?
- Understanding the Metasploit structure
- The Metasploit database
- Understand the msfconsole
- Understanding payloads and stagers within Metasploit
- How to create payloads and stagers
- Understanding encoders within Metasploit
- What is Meterpreter?
- How to use Meterpreter
- What is msfvenom?
- How to use msfvenom
- Understand how to use the incognito extension
- Understand information Gathering and Scanning
- Understanding scanners within Metasploit
- How to use scanners
- Discovering services and exploits
- How to discover services
- How to discover exploits
- Understanding attack terminology
- Selecting the type of attack
- Configuring an exploit and payload
- Launching an attack
- Generating client payloads
- Creating handlers for reverse shells
- Creating and using a reverse shell
- Understand how to bypass antivirus
- Exploit a windows workstation
- Use an office macro attack
- Bypass antivirus protection
- Bypass antivirus protection (Part 2)
- Using post-exploitation modules
- Understand how to pivot
- Using port-forwarding
- Using Mimikatz
- Using enumeration modules
- Next steps
Taught by
Liam Cleary
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent