Learn the Metasploit Framework inside out

This course structure is based on the PTES. You'll learn Metasploit, its limits, and how to work around them
4.33 (58 reviews)
Udemy
platform
English
language
Network & Security
category
Learn the Metasploit Framework inside out
727
students
4 hours
content
Feb 2018
last update
$19.99
regular price

Why take this course?

🛠️ Master Metasploit with Learn the Metasploit Framework inside out 🚀

Course Headline: Dive deep into the world of cyber security with this comprehensive course based on the Penetration Testing Execution Standard (PTES)! Gain expertise in Metasploit, its limitations, and learn advanced techniques to overcome them. This is not just another introductory course – it's your path to mastery.


Course Description: Embark on a journey through the core aspects of the Metasploit framework, integrating key phases of the PTES methodology. This course isn't about scratching the surface; it's about immersing yourself in the depths of information gathering, vulnerability assessment, exploitation, and post-exploitation. 🕵️‍♂️🛠️

With a focus on real-world application, we'll cover a wide array of topics, including:

  • Social Engineering 🤫
  • Privilege Escalation 🔝
  • Antivirus Evasion 🚫🠪
  • Persistent Backdoors 🔌
  • Trojanizing Executable Files 💾
  • Remote Desktop Penetration Testing 🖥️
  • Web Penetration Testing 🌐
  • Port Forwarded Reverse Shells ⚫️
  • Beef-XSS Framework 🔗
  • Event Log Management 📜

Whether you're a beginner with confidence in generic software, familiarity with the Linux command line, and a bit of system administration experience, or an intermediate user looking to refine your skills – this course is tailored for you. If you hit any roadblocks, I'm here to assist and guide you through. 🤝


Hardware Requirements: To get the most out of this course, we recommend a host machine with:

  • At least 8 GB of RAM
  • A moderately fast processor
  • 70 GB of hard-drive space for the vulnerable virtual machine
  • An additional 30 GB for the Kali VM or an alternative setup 💻

Course Structure: The course is meticulously organized into 7 main sections, each building upon the previous:

  1. Setup and PTES Introduction 📚

    • Environment configuration
    • Introduction to PTES
    • Setting up Metasploit on Windows and other platforms
  2. Metasploit Fundamentals 🧪

    • Core commands and automation
    • Running exploits and Metasploit modules
  3. Information Gathering with Nmap and Metasploit 🔍

    • Mapping the attack surface
    • Identifying services and vulnerabilities
  4. Vulnerability Assessment 🚨

    • Integrating Nessus with Metasploit
    • Populating the workspace with vulnerability data
  5. Exploiting Services in Metasploitable3 🚀

    • Exploiting seven services
    • Web penetration testing techniques
  6. Social Engineering and Malicious File Creation 🤩

    • Crafting social engineering payloads
    • Creating trojanized files to lower antivirus detection
    • Integrating Beef-XSS for complex attacks
  7. Post-Exploitation: Monitoring, Keyboard Logging, and Backdoors 🕵️‍♂️

    • Establishing persistent backdoors
    • Monitoring user activities
    • Managing event logs
  8. Course Outro and Credits 🎓

    • Summarizing key takeaways
    • Acknowledging the efforts of all involved

Join Adriano Gattabuiac for this transformative learning experience where you will not just learn about Metasploit, but truly understand its power and capabilities. Enroll now and unlock your potential in cyber security! 🎯🚀

Loading charts...

1562522
udemy ID
20/02/2018
course created date
23/11/2019
course indexed date
Bot
course submited by