Back

Duration

2.5 hours

Price

Level

Intermediate

Certification

Available

Instructor

Packt Publishing

Create a threat-free environment with the best-in-class tool

Expected learning & outcomes

  • Get to know the absolute basics of the Metasploit framework so you have a strong foundation for advanced attacks.
  • Integrate and use various supporting tools to make Metasploit even more powerful and precise.
  • Set up the Metasploit environment along with your own virtual testing lab.
  • Use Metasploit for information gathering and enumeration before planning the blueprint for the attack on the target system.
  • Get your hands dirty by firing up Metasploit in your own virtual lab and hunt down real vulnerabilities.
  • Discover the clever features of the Metasploit framework for launching sophisticated and deceptive client-side attacks that bypass the perimeter security.
  • Leverage Metasploit capabilities to perform Web application security scanning.

    Skills you will learn

    CEH, CISM , Compliance, Information Security, Networks, Planning, Police, Testing

    About this course

    This course will begin by introducing you to Metasploit and its functionality. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools and components used by Metasploit. Further, in the video, you will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools. Next, you'll get hands-on experience carrying out client-side attacks. Moving on, you'll learn about web application security scanning and bypassing anti-virus and clearing traces on the target system post-compromise. This video will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit. By the end of this course, you'll get the hang of bypassing different defences, after which you'll learn how hackers use the network to gain access to different systems.

    About the author

    Sagar Rahalkar is a seasoned information security professional having more than 10 years of comprehensive experience in various verticals of IS. His domain expertise is mainly into breach detection, cybercrime investigations, digital forensics, application security, vulnerability assessment and penetration testing, compliance for mandates and regulations, IT GRC, and much more. He holds a master’s degree in computer science and several industry-recognized certifications such as Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist-Rational AppScan, Certified Information Security Manager (CISM), and PRINCE2. He has been closely associated with Indian law enforcement agencies for more than 3 years dealing with digital crime investigations and related training and received several awards and appreciation from senior officials of the police and defence organizations in India. Sagar has also been a reviewer and author for various books and online publications.

    LORE ADVANTAGE

    Lore delivers value at the intersection of learning, interests and skills.

    Learn from Domain Experts

    Access learning options recommended by industry experts, professionals and thought leaders.

    Search & Compare

    Quickly search, select and add learning options to your learning list.

    Personalize your feed

    Tell us more about yourself to access the latest learning options, curated just for you.