Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Metasploit: Getting Started

Description

Penetration testing is an exciting way to blend an attacker mindset with the tools needed to identify security problems. This course will teach you the basics of the Metasploit Framework to test and exploit vulnerable systems.

The Metasploit Framework is a very capable exploitation toolkit. It is not an easy tool to quickly understand and utilize effectively. In this course, Metasploit: Getting Started, you’ll learn to use the Metasploit Framework to configure and launch exploits with payloads to compromise vulnerable target systems in a red team and penetration testing context. First, you’ll explore the Metasploit Framework architecture, which is key to understanding the framework’s capabilities and inner workings. Next, you’ll discover how to configure the Metasploit Framework for launching an attack. Finally, you’ll learn how to use the Metasploit Framework’s tools for post-exploitation activities once a system has been compromised. When you’re finished with this course, you’ll have the skills and knowledge of configuring and launching penetration tests needed to effectively use the Metasploit Framework.

Tags
Online Course


Metasploit: Getting Started

Affiliate notice

Penetration testing is an exciting way to blend an attacker mindset with the tools needed to identify security problems. This course will teach you the basics of the Metasploit Framework to test and exploit vulnerable systems.

The Metasploit Framework is a very capable exploitation toolkit. It is not an easy tool to quickly understand and utilize effectively. In this course, Metasploit: Getting Started, you’ll learn to use the Metasploit Framework to configure and launch exploits with payloads to compromise vulnerable target systems in a red team and penetration testing context. First, you’ll explore the Metasploit Framework architecture, which is key to understanding the framework’s capabilities and inner workings. Next, you’ll discover how to configure the Metasploit Framework for launching an attack. Finally, you’ll learn how to use the Metasploit Framework’s tools for post-exploitation activities once a system has been compromised. When you’re finished with this course, you’ll have the skills and knowledge of configuring and launching penetration tests needed to effectively use the Metasploit Framework.