Exploring SecOps Tools: Penetration Testing Using Metasploit Framework

SecOps    |    Intermediate
  • 10 Videos | 1h 7m 42s
  • Includes Assessment
  • Earns a Badge
Metasploit is an open-source penetration testing framework that can be used by security professionals and ethical hackers to verify vulnerabilities, manage security assessments, and improve security awareness. One of the primary capabilities of Metasploit is the ability to write, test, and execute exploit code. In this course, you'll explore the Metasploit framework, its features, and its capabilities. Discover the Metasploit module types, including exploit, auxiliary, post-exploitation, payload, and no operation payload (NOP) generator, and identify possible disadvantages and limitations of Metasploit. Explore how to download and install Metasploit and discover how to work with modules, exploits, and payloads. Lastly, explore how to execute common Metasploit commands and recognize key steps involved in attacking a system using Metasploit.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    provide an overview of the Metasploit platform and outline its features
    outline the Metasploit module types including exploit, auxiliary, post-exploitation, payload, and no operation payload (NOP) generator
    identify possible advantages and disadvantages of Metasploit
    download and install Metasploit
  • outline discovery scan options in Metasploit
    demonstrate how to work with modules, exploits, and payloads in Metasploit
    execute common Metasploit commands
    demonstrate how to attack a system using Metasploit
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 14s
    UP NEXT
  • Playable
    2. 
    Getting Started with Metasploit
    6m 27s
  • Locked
    3. 
    Metasploit Modules
    8m 25s
  • Locked
    4. 
    Metasploit Advantages and Disadvantages
    7m 35s
  • Locked
    5. 
    Installing Metasploit
    7m 38s
  • Locked
    6. 
    Discovery Scans
    6m 17s
  • Locked
    7. 
    Working With Modules, Exploits, and Payloads
    12m 17s
  • Locked
    8. 
    Exploring Common Metasploit Commands
    10m 2s
  • Locked
    9. 
    Attacking Systems Using Metasploit
    7m 8s
  • Locked
    10. 
    Course Summary
    40s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.