Penetration Testing with the Metasploit Framework
Offered By: Pluralsight
Course Description
Overview
For professional penetration testers who want to take their skills to the next level using the Metasploit framework. This is a hands-on course that will show you in a different angle the penetration testing workflow and how to apply it in practice.
Penetration testing workflow is a big challenge in our career as security professionals. In this course, Penetration Testing with the Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Next, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to elevate your privileges and move laterally on the network. When you are finished with this course, you will have the skills and knowledge of conducting a successful penetration test like the pros.
Penetration testing workflow is a big challenge in our career as security professionals. In this course, Penetration Testing with the Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Next, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to elevate your privileges and move laterally on the network. When you are finished with this course, you will have the skills and knowledge of conducting a successful penetration test like the pros.
Syllabus
- Course Overview 1min
- Introduction to This Course 19mins
- Searching for Vulnerabilities to Exploit 22mins
- Exploits, Payloads, and Reverse Shells 29mins
- Privilege Escalation Using Meterpreter 20mins
Taught by
Gus Khawaja
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity