Post Exploitation Courses
New York University (NYU) via edX Metasploit Framework: Penetration Testing with Metasploit
Udemy Metasploit
Cybrary Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
CAE in Cybersecurity Community via YouTube Advanced Phishing Tactics Beyond User Awareness
YouTube Introducing the Smartphone Penetration Testing Framework
BruCON Security Conference via YouTube Pacu - Attack and Post-Exploitation in AWS
BSidesLV via YouTube The Past, Present & Future of Enterprise Security
Hack in Paris via YouTube Pivoting and Exploitation in Docker Environment
Ekoparty Security Conference via YouTube Post Exploitation - Transferring Files to Windows Targets
HackerSploit via YouTube