Information Technology
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Metasploit: Getting Started

Course Cover
compare button icon

Course Features

icon

Duration

125 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Teaching Type

Self Paced

icon

Video Content

125 minutes

Course Description

The Metasploit Framework can be used as a powerful exploitation toolkit. It can be difficult to use and quickly grasp. This course, Metasploit Getting Started, will teach you how to use the Metasploit framework to launch exploits and compromise vulnerable target systems using payloads in a red team or penetration testing context. The Metasploit Framework architecture is the first step in understanding the capabilities and inner workings of the framework. Next, you will learn how to set up the Metasploit Framework in order to launch an attack. You'll also learn how to use the Metasploit framework's tools for post-exploitation activities after a system is compromised. After completing this course, your knowledge and skills in configuring and launching penetration testing will be a part of the Metasploit framework.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Learn to use the Metasploit Framework to configure and launch exploits with payloads to compromise vulnerable target systems in a red team and penetration testing context

First, you’ll explore the Metasploit Framework architecture, which is key to understanding the framework’s capabilities and inner workings

Next, you’ll discover how to configure the Metasploit Framework for launching an attack

Finally, you’ll learn how to use the Metasploit Framework’s tools for post-exploitation activities once a system has been compromised

When you’re finished with this course, you’ll have the skills and knowledge of configuring and launching penetration tests needed to effectively use the Metasploit Framework

Course Instructors

Author Image

Keith Watson

Instructor

Keith Watson has been an information security professional since 1997. He started as a software developer for security tools and moved into more advanced roles as a product manager for operating syst...
Course Cover