Video description
Metasploit is the most common command and control (C2) framework used by penetration testers and red team operators around the globe. It is a framework that is a “must-know” and will give you the confidence to successfully operate on a target network.
This course is very hands-on. Presentations will be minimal because we believe the best way for you to learn is to have your hands on the keyboard. If you have the interest, passion, or desire to learn, We will guide you through this course step by step. You should be able to follow along with video instructions and please take notes! We will not only teach you how to use Metasploit, but we will teach it as if you were using it for a real penetration test!
Table of contents
- Chapter 1: Getting Started with Metasploit
- Chapter 2: Getting Up and Running with Metasploit Basics
- Chapter 3: Working with Exploits, Payloads, and Shells
- Chapter 4: Process Migration with Meterpreter and Meterpreter Functions
- Chapter 5: Firewalls, Antivirus, and External Callbacks
- Chapter 6: Privilege Escalation and Persistence
- Chapter 7: Lateral Movement, Pivoting, and Common Practices
- Chapter 8: Final Thoughts and Wrapping Up
Product information
- Title: Metasploit Like a Pro
- Author(s):
- Release date: August 2020
- Publisher(s): EC-Council
- ISBN: None
You might also like
video
The Complete Cybersecurity Bootcamp, 2nd Edition
26 Hours of Video Instruction 26 Hours of Detailed, Curated Video Training to Take You from …
video
Offensive Hacking Unfolded - Become a Pro Pentester
In this course, you will learn the very basics of installing VMware and what to do …
book
Linux Basics for Hackers
If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for …
book
Troubleshooting with the Windows Sysinternals Tools
Optimize Windows system reliability and performance with Sysinternals IT pros and power users consider the free …