Penetration testing with Metasploit

Course Feature
  • Cost
    Paid
  • Provider
    Udemy
  • Certificate
    Paid Certification
  • Language
    English
  • Start Date
    2021-07-20
  • Learners
    No Information
  • Duration
    No Information
  • Instructor
    Nima ShahmoradiNasim Kangari
Next Course
4.4
23 Ratings
This "Penetration Testing with Metasploit" course is the perfect way to learn the popular security tools and techniques needed to run penetration tests. With this course, you will go from beginner to extremely high-level and be taken through each step with hands-on examples. You will learn the fundamentals of ethical hacking, the world's most used penetration testing framework, and how to use Kali, Nmap, and Metasploit to protect yourself from cyber security threats. This course covers topics such as fuzzing, buffer overflow, keylogger, browser attack, shell to meterpreter, PowerShell, mp3 & mp4, and more. With this course, you will become an expert in using Metasploit and be able to use auxiliary, payload, exploit, encoder, and post modules, as well as MSFconsole, Nmap integration, port scanning, vulnerability scanning, exploitation, and post-exploitation.
Show All
Course Overview

❗The content presented here is sourced directly from Udemy platform. For comprehensive course details, including enrollment information, simply click on the 'Go to class' link on our website.

Updated in [August 13th, 2023]

Skills and Knowledge Acquired:
By taking this course, participants will acquire the skills and knowledge necessary to use Metasploit, the world's most used penetration testing framework. This includes learning the fundamentals of ethical hacking, using popular security tools and techniques, running penetration tests with Kali and Nmap, and understanding auxiliary, payload, exploit, encoder, and post modules. Participants will also learn how to integrate Nmap and Metasploit, scan for vulnerabilities, exploit and gain access, and use post-exploitation with Meterpreter. Additionally, participants will gain an understanding of fuzzing, buffer overflow, keylogger, browser attack, shell to meterpreter, PowerShell, mp3 & mp4, and other related topics.


Contribution to Professional Growth:
This course contributes to professional growth by providing a comprehensive overview of the popular security tools and techniques used in penetration testing. It covers topics such as Metasploit, Nmap, vulnerability scanning, exploitation, and post-exploitation. Through hands-on examples, learners will gain the knowledge and skills necessary to become an expert in using Metasploit and other security tools. Additionally, the course provides an understanding of the cyber security threats and how to protect against them in a professional manner.


Suitability for Further Education:
This course is suitable for preparing further education in the field of penetration testing and ethical hacking. It covers the fundamentals of ethical hacking, as well as the popular security tools and techniques needed to run penetration tests with Kali and Metasploit. The course also covers topics such as vulnerability scanning, exploitation, and post-exploitation. Additionally, the course provides hands-on examples to help learners gain a better understanding of the topics.

Course Syllabus

Introduction

Metasploit framework

Intro msf

Scanning with Metasploit

Scanning WordPress with Metasploit

getting access with vsftpd

getting access with samba

getting access with Netcat

getting access with PowerShell

getting access with irc and distc

getting access with vnc and java

getting access with eternalblue

brute force attack

shell to meterpreter

set exploit on mp3 and mp4 file

maintaining access

Basic command in meterpreter

Meterpreter important commands

Create server file

Create backdoor file

Instructional commands

Sending and receive data

Compiling the program

change directory to target

Downloading file

Uploading file

Projects

Bonus part

Show All
Recommended Courses
free food-microbiology-and-food-safety-11164
Food Microbiology and Food Safety
5.0
ThaiMOOC 608 learners
Learn More
This course provides an overview of food microbiology and food safety, covering topics such as important genera of microorganisms associated with food, techniques for enumeration and control of microorganisms, food spoilage, food fermentation, foodborne diseases, food safety rules and regulations, and food safety management systems. Learners will gain essential knowledge and applications of various techniques for preserving food and ensuring food safety and hygiene.
free history-relivanee-of-microbiology-11165
History & Relivanee Of Microbiology
2.5
Youtube 4 learners
Learn More
Nursing students in their first year of BSc Nursing are introduced to the history and relevance of Microbiology in their course. Shubam Sir teaches them the principles of Microbiology and how it is applicable to their field. This course provides a comprehensive overview of the subject and its importance in the nursing profession.
free microbiology-with-diseases-by-taxonomy-textbook-by-robert-bauman-11166
Microbiology with Diseases by Taxonomy Textbook by: Robert Bauman
1.5
Youtube 7 learners
Learn More
This chapter of Microbiology with Diseases by Taxonomy covers the history of microbiology, cell structure and function, microscopy and staining, and microbial metabolism. It provides an overview of the development of the field of microbiology, as well as the tools and techniques used to study microorganisms. It also examines the metabolic processes of microorganisms and how they interact with their environment.
free microbiology-lectures-11167
Microbiology Lectures
2.0
Youtube 10 learners
Learn More
This course covers the scope and impact of microbiology on human use, including infectious diseases caused by microorganisms, historical foundations, and the naming, classifying, and evolution of microorganisms. It also explores the bonds and molecules of microorganisms, as well as culturing, staining, and microscopy techniques.
Favorites (0)
Favorites
0 favorite option

You have no favorites

Name delet