Metasploit Concepts and Basic Configuration
Offered By: Pluralsight
Course Description
Overview
Learn the fundamentals of Metasploit for effective penetration testing. This course will teach you how to utilize Metasploit Framework for vulnerability assessment, exploitation, and data management, enhancing your skills as a penetration tester.
Penetration testing can be challenging without the right tools and knowledge. In this course, Metasploit Concepts and Basic Configuration, you'll learn to effectively utilize Metasploit Framework for penetration testing. First, you'll explore how to launch Metasploit and set up a vulnerable environment for practice. Next, you'll discover the architecture of Metasploit, including how to configure modules, payloads, and exploits. Finally, you'll learn how to manage operations and data within Metasploit, including session management and data export/import. When you're finished with this course, you'll have the skills and knowledge of Metasploit needed to perform thorough and effective penetration tests.
Penetration testing can be challenging without the right tools and knowledge. In this course, Metasploit Concepts and Basic Configuration, you'll learn to effectively utilize Metasploit Framework for penetration testing. First, you'll explore how to launch Metasploit and set up a vulnerable environment for practice. Next, you'll discover the architecture of Metasploit, including how to configure modules, payloads, and exploits. Finally, you'll learn how to manage operations and data within Metasploit, including session management and data export/import. When you're finished with this course, you'll have the skills and knowledge of Metasploit needed to perform thorough and effective penetration tests.
Syllabus
- Introduction to Metasploit and Penetration Testing Methodology 9mins
- Understanding Metasploit Framework Architecture 21mins
- Managing Operations and Data in Metasploit 28mins
Taught by
Kevin James
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent