Metasploit Concepts and Basic Configuration
Offered By: Pluralsight
Course Description
Overview
Learn the fundamentals of Metasploit for effective penetration testing. This course will teach you how to utilize Metasploit Framework for vulnerability assessment, exploitation, and data management, enhancing your skills as a penetration tester.
Penetration testing can be challenging without the right tools and knowledge. In this course, Metasploit Concepts and Basic Configuration, you'll learn to effectively utilize Metasploit Framework for penetration testing. First, you'll explore how to launch Metasploit and set up a vulnerable environment for practice. Next, you'll discover the architecture of Metasploit, including how to configure modules, payloads, and exploits. Finally, you'll learn how to manage operations and data within Metasploit, including session management and data export/import. When you're finished with this course, you'll have the skills and knowledge of Metasploit needed to perform thorough and effective penetration tests.
Penetration testing can be challenging without the right tools and knowledge. In this course, Metasploit Concepts and Basic Configuration, you'll learn to effectively utilize Metasploit Framework for penetration testing. First, you'll explore how to launch Metasploit and set up a vulnerable environment for practice. Next, you'll discover the architecture of Metasploit, including how to configure modules, payloads, and exploits. Finally, you'll learn how to manage operations and data within Metasploit, including session management and data export/import. When you're finished with this course, you'll have the skills and knowledge of Metasploit needed to perform thorough and effective penetration tests.
Syllabus
- Introduction to Metasploit and Penetration Testing Methodology 9mins
- Understanding Metasploit Framework Architecture 21mins
- Managing Operations and Data in Metasploit 28mins
Taught by
Kevin James
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity