Metasploit Essential Training
Offered By: LinkedIn Learning
Course Description
Overview
          Leverage the core functionalities of the Metasploit framework for information gathering, vulnerability scanning, and client-side and post-exploitation activities and management.
        
Syllabus
          Introduction
- The essentials of Metasploit
 - What you should know
 
- What is Metasploit?
 - Why use Metasploit?
 - Understanding the Metasploit structure
 - The Metasploit database
 
- Understand the msfconsole
 - Understanding payloads and stagers within Metasploit
 - How to create payloads and stagers
 - Understanding encoders within Metasploit
 
- What is Meterpreter?
 - How to use Meterpreter
 - What is msfvenom?
 - How to use msfvenom
 - Understand how to use the incognito extension
 
- Understand information Gathering and Scanning
 - Understanding scanners within Metasploit
 - How to use scanners
 - Discovering services and exploits
 - How to discover services
 - How to discover exploits
 
- Understanding attack terminology
 - Selecting the type of attack
 - Configuring an exploit and payload
 - Launching an attack
 
- Generating client payloads
 - Creating handlers for reverse shells
 - Creating and using a reverse shell
 - Understand how to bypass antivirus
 - Exploit a windows workstation
 - Use an office macro attack
 - Bypass antivirus protection
 - Bypass antivirus protection (Part 2)
 
- Using post-exploitation modules
 - Understand how to pivot
 - Using port-forwarding
 - Using Mimikatz
 - Using enumeration modules
 
- Next steps
 
Taught by
Liam Cleary
Related Courses
Español Salamanca A2Universidad de Salamanca via Miríadax Discovering Science: Science Writing
University of Leeds via FutureLearn Создание концепции интерфейса
Moscow Institute of Physics and Technology via Coursera การรู้สารสนเทศ |Infomation Literacy
Nakhon Ratchasima Rajabhat University via ThaiMOOC Procurement Negotiation
Rutgers University via Coursera