PENTESTING WITH METASPLOIT

An expanded syllabus of the popular Pentesting with Metasploit 1 day class, with additional brand new material, this class is an ideal crash course for beginning and aspiring penetration testers. Starting out with the basics of using Linux systems and writing scripts and programs, this course quickly moves into using penetration testing tools such as the Metasploit Framework.

Using Windows and Linux targets with real vulnerabilities encountered on pentests, students work through a hands on pentest being with open source intelligence gathering, moving through identifying vulnerabilities, exploitation, and finishing up with some post exploitation techniques, leaving students with a foundation for the more advanced post exploitation techniques covered in Pentesting Level 2. No previous pentesting, Linux, or programming experience is required.

HOW IT WORKS

This class is pre-recorded and available on demand. You don’t have to be free for a whole Saturday to take it, as you do for the live option. You may work through this class at your own pace. You download the videos, virtual machines, and slides and work through the class independently. Based on what lab options you choose, you get a period of access to the Bulb Security or a training partner’s lab to practice your skills on a variety of targets.

WHAT YOU GET

  • Recorded Hands on Material
  • 2 preconfigured target virtual machines (Windows and Linux)
  • VPN Lab access with additional targets (multiple lab options available)
  • Slides/Exercise Guide

COURSE OUTLINE

timeline_pre_loader

Module 1

Using Kali Linux

Module 2

Programming

Module 3

Using Metasploit

Module 4

Information Gathering

Module 5

Vulnerability Identification

Module 6

Traffic Capture

Module 7

Exploitation

Module 8

Password Attacks

Module 9

Post Exploitation

COURSE OUTLINE

Module 1: Using Kali Linux

Module 2: Programming

Module 3: Using Metasploit

Module 4: Information Gathering

Module 5: Vulnerability Identification

Module 6: Traffic Capture

Module 7: Exploitation

Module 8: Password Attacks

Module 9: Post Exploitation