Video description
Metasploit is the most common command and control (C2) framework used by penetration testers and red team operators around the globe. It is a framework that is a “must-know” and will give you the confidence to successfully operate on a target network.
This course is very hands-on. Presentations will be minimal because we believe the best way for you to learn is to have your hands on the keyboard. If you have the interest, passion, or desire to learn, We will guide you through this course step by step. You should be able to follow along with video instructions and please take notes! We will not only teach you how to use Metasploit, but we will teach it as if you were using it for a real penetration test!
Table of contents
- Chapter 1: Getting Started with Metasploit
- Chapter 2: Getting Up and Running with Metasploit Basics
- Chapter 3: Working with Exploits, Payloads, and Shells
- Chapter 4: Process Migration with Meterpreter and Meterpreter Functions
- Chapter 5: Firewalls, Antivirus, and External Callbacks
- Chapter 6: Privilege Escalation and Persistence
- Chapter 7: Lateral Movement, Pivoting, and Common Practices
- Chapter 8: Final Thoughts and Wrapping Up
Product information
- Title: Metasploit Like a Pro
- Author(s):
- Release date: August 2020
- Publisher(s): EC-Council
- ISBN: None
You might also like
book
Hands on Hacking
A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the …
book
97 Things Every Information Security Professional Should Know
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In …
book
Troubleshooting with the Windows Sysinternals Tools
Optimize Windows system reliability and performance with Sysinternals IT pros and power users consider the free …
book
Linux Basics for Hackers
If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for …