About this course
This course will cover all of the fundamental aspects of the Metasploit framework, tying a subset of the phases of the penetration testing execution standard (PTES) methodology to the course structure.
These will be specific information gathering, vulnerability assessment, exploitation, and post-exploitation.
The course also goes beyond the basics by dealing with social engineering, privilege escalation, antivirus evasion, persistent backdoors, romanizing executable files, remote desktops, web penetration testing, port-forwarded reverse shells, the Beef-XSS Framework, and event log management. To follow this course you will need to be confident using generic software programs, know the basics of the Linux command line, and a little about system administration.
Concerning hardware requirements: a host machine with at least 8 GB of RAM with a moderately fast processor, 70 GB of hard-drive space for the vulnerable virtual machine, and another 30GB for the Kali VM is a good setup to have, but not mandatory: you can also alternatively install the vulnerable machine on another pc in your home network and work with Kali on your main machine.
This course includes:
schedule4 hours on-demand video
signal_cellular_altBeginner level
task_altNo preparation required
calendar_todayPublished At May 17, 2023
workspace_premiumCertificate of completion
errorNo prerequisites
lock1 year access