Metasploit Concepts and Basic Configuration
Offered By: Pluralsight
Course Description
Overview
Learn the fundamentals of Metasploit for effective penetration testing. This course will teach you how to utilize Metasploit Framework for vulnerability assessment, exploitation, and data management, enhancing your skills as a penetration tester.
Penetration testing can be challenging without the right tools and knowledge. In this course, Metasploit Concepts and Basic Configuration, you'll learn to effectively utilize Metasploit Framework for penetration testing. First, you'll explore how to launch Metasploit and set up a vulnerable environment for practice. Next, you'll discover the architecture of Metasploit, including how to configure modules, payloads, and exploits. Finally, you'll learn how to manage operations and data within Metasploit, including session management and data export/import. When you're finished with this course, you'll have the skills and knowledge of Metasploit needed to perform thorough and effective penetration tests.
Penetration testing can be challenging without the right tools and knowledge. In this course, Metasploit Concepts and Basic Configuration, you'll learn to effectively utilize Metasploit Framework for penetration testing. First, you'll explore how to launch Metasploit and set up a vulnerable environment for practice. Next, you'll discover the architecture of Metasploit, including how to configure modules, payloads, and exploits. Finally, you'll learn how to manage operations and data within Metasploit, including session management and data export/import. When you're finished with this course, you'll have the skills and knowledge of Metasploit needed to perform thorough and effective penetration tests.
Syllabus
- Introduction to Metasploit and Penetration Testing Methodology 9mins
- Understanding Metasploit Framework Architecture 21mins
- Managing Operations and Data in Metasploit 28mins
Taught by
Kevin James
Related Courses
Evaluación de peligros y riesgos por fenómenos naturalesUniversidad Nacional Autónoma de México via Coursera Internet Security
openHPI Planning a Security Incident Response
Microsoft via edX Cyber Security
CEC via Swayam Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam