YoVDO

Metasploit Essential Training

Offered By: LinkedIn Learning

Tags

Penetration Testing Courses Metasploit Courses Information Gathering Courses Vulnerability Scanning Courses Post Exploitation Courses Meterpreter Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Leverage the core functionalities of the Metasploit framework for information gathering, vulnerability scanning, and client-side and post-exploitation activities and management.

Syllabus

Introduction
  • The essentials of Metasploit
  • What you should know
1. Introduction to Metasploit
  • What is Metasploit?
  • Why use Metasploit?
  • Understanding the Metasploit structure
  • The Metasploit database
2. Exploring Metasploit
  • Understand the msfconsole
  • Understanding payloads and stagers within Metasploit
  • How to create payloads and stagers
  • Understanding encoders within Metasploit
3. Using Meterpreter
  • What is Meterpreter?
  • How to use Meterpreter
  • What is msfvenom?
  • How to use msfvenom
  • Understand how to use the incognito extension
4. Information gathering and scanning
  • Understand information Gathering and Scanning
  • Understanding scanners within Metasploit
  • How to use scanners
  • Discovering services and exploits
  • How to discover services
  • How to discover exploits
5. Performing Attacks
  • Understanding attack terminology
  • Selecting the type of attack
  • Configuring an exploit and payload
  • Launching an attack
6. Client-Side Exploitation
  • Generating client payloads
  • Creating handlers for reverse shells
  • Creating and using a reverse shell
  • Understand how to bypass antivirus
  • Exploit a windows workstation
  • Use an office macro attack
  • Bypass antivirus protection
  • Bypass antivirus protection (Part 2)
7. Managing Post-Exploitation
  • Using post-exploitation modules
  • Understand how to pivot
  • Using port-forwarding
  • Using Mimikatz
  • Using enumeration modules
Conclusion
  • Next steps

Taught by

Liam Cleary

Related Courses

Certified Ethical Hacking (v12)
LearnKartS via Coursera
Intermediate Ethical Hacking Hands-on Training
Packt via Coursera
Nessus Scanner - Network Scanning from Beginner to Advanced
Packt via Coursera
Offensive Hacking Unfolded - Become a Pro Pentester
Packt via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX