P
Pierre Madissoueke
Awsome
Celebrating 11 Years of Learning Excellence! Use: TP11
Based on the Penetration Testing Execution Standard, you'll learn Metasploit, its limits, and how to work around them
IT and Software ,Network and Security,Penetration Testing
Lectures -38
Duration -3.5 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
This course will cover all of the fundamental aspects of the Metasploit framework, tying a subset of the phases of the penetration testing execution standard (PTES) methodology to the course structure. These will be specific information gathering, vulnerability assessment, exploitation and post-exploitation.
The course also goes beyond the basics by dealing with social engineering, privilege escalation, antivirus evasion, persistent backdoors, trojanizing executable files, remote desktop, web penetration testing, port forwarded reverse shells, the Beef-XSS Framework, event log management.
To follow this course you will need to be confident using generic software programs, know the basics of the Linux command line and a little of system administration.
If something isn't clear or doesn't work on your system you can always hit me up and we'll solve the problem. Concerning hardware requirements: a host machine with at least 8 GB of RAM with a moderately fast processor, 70 GB of hard-drive space for the vulnerable virtual machine and other 30GB for the Kali VM is a good setup to have, but not mandatory: you can also alternatively install the vulnerable machine on another pc in your home network and work with Kali on your main machine.
The course is laid out in 7 main sections:
Who should take this course?
Check out the detailed breakdown of what’s inside the course
Adriano Gattabuia
Use your certificate to make a career change or to advance in your current career.
Awsome
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowMaster prominent technologies at full length and become a valued certified professional.
Explore Now