YoVDO

Metasploit Essential Training

Offered By: LinkedIn Learning

Tags

Penetration Testing Courses Metasploit Courses Information Gathering Courses Vulnerability Scanning Courses Post Exploitation Courses Meterpreter Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Leverage the core functionalities of the Metasploit framework for information gathering, vulnerability scanning, and client-side and post-exploitation activities and management.

Syllabus

Introduction
  • The essentials of Metasploit
  • What you should know
1. Introduction to Metasploit
  • What is Metasploit?
  • Why use Metasploit?
  • Understanding the Metasploit structure
  • The Metasploit database
2. Exploring Metasploit
  • Understand the msfconsole
  • Understanding payloads and stagers within Metasploit
  • How to create payloads and stagers
  • Understanding encoders within Metasploit
3. Using Meterpreter
  • What is Meterpreter?
  • How to use Meterpreter
  • What is msfvenom?
  • How to use msfvenom
  • Understand how to use the incognito extension
4. Information gathering and scanning
  • Understand information Gathering and Scanning
  • Understanding scanners within Metasploit
  • How to use scanners
  • Discovering services and exploits
  • How to discover services
  • How to discover exploits
5. Performing Attacks
  • Understanding attack terminology
  • Selecting the type of attack
  • Configuring an exploit and payload
  • Launching an attack
6. Client-Side Exploitation
  • Generating client payloads
  • Creating handlers for reverse shells
  • Creating and using a reverse shell
  • Understand how to bypass antivirus
  • Exploit a windows workstation
  • Use an office macro attack
  • Bypass antivirus protection
  • Bypass antivirus protection (Part 2)
7. Managing Post-Exploitation
  • Using post-exploitation modules
  • Understand how to pivot
  • Using port-forwarding
  • Using Mimikatz
  • Using enumeration modules
Conclusion
  • Next steps

Taught by

Liam Cleary

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent