Metasploit Concepts and Basic Configuration
Offered By: Pluralsight
Course Description
Overview
Learn the fundamentals of Metasploit for effective penetration testing. This course will teach you how to utilize Metasploit Framework for vulnerability assessment, exploitation, and data management, enhancing your skills as a penetration tester.
Penetration testing can be challenging without the right tools and knowledge. In this course, Metasploit Concepts and Basic Configuration, you'll learn to effectively utilize Metasploit Framework for penetration testing. First, you'll explore how to launch Metasploit and set up a vulnerable environment for practice. Next, you'll discover the architecture of Metasploit, including how to configure modules, payloads, and exploits. Finally, you'll learn how to manage operations and data within Metasploit, including session management and data export/import. When you're finished with this course, you'll have the skills and knowledge of Metasploit needed to perform thorough and effective penetration tests.
Penetration testing can be challenging without the right tools and knowledge. In this course, Metasploit Concepts and Basic Configuration, you'll learn to effectively utilize Metasploit Framework for penetration testing. First, you'll explore how to launch Metasploit and set up a vulnerable environment for practice. Next, you'll discover the architecture of Metasploit, including how to configure modules, payloads, and exploits. Finally, you'll learn how to manage operations and data within Metasploit, including session management and data export/import. When you're finished with this course, you'll have the skills and knowledge of Metasploit needed to perform thorough and effective penetration tests.
Syllabus
- Introduction to Metasploit and Penetration Testing Methodology 9mins
- Understanding Metasploit Framework Architecture 21mins
- Managing Operations and Data in Metasploit 28mins
Taught by
Kevin James
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX