Complete Metasploit Course: Beginner to Advance
3.2 (182 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
21,042 students enrolled

Complete Metasploit Course: Beginner to Advance

Learn Metasploit like a professional hacker! Start as a beginner and go all the way to launching ethical hacking attack.
3.2 (182 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
21,042 students enrolled
Last updated 8/2019
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 2.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Metasploit Basics
  • Learn and Understand Metasploit
  • Hacking using Metasploit
  • Launching Attacks Using Metasploit
  • Intelligence Gathering and Scanning
  • Vulnerability Scanning
  • Metasploit Auxiliary Modules
  • Meterpreter
  • Meterpreter Scripting
  • Karmetasploit
  • WiFi Hacking
  • Password Hacking
  • Social Engineering Hacking
  • Creating Undetectable Backdoors and Using Rootkits
  • Privilege Escalation
  • Controlling Victim
  • Using Metasploit and Kali Linux Together
  • Advanced Hacking Using Metasploit
Requirements
  • A Pc or Mac with an internet connection
Description

Welcome to my course "Complete Metasploit Course: Beginner to Advance". By using this comprehensive course you will learn the basics of Metasploit, Some of the advanced methods of Metasploit and much more.In this course i will assume that you have no prior knowledge about Ethical Hacking or Metasploit and by the end of the course you will be at advanced level. Learn to launch ethical hacking attacks like a professional hacker. This course will guide you step by step so that you will learn basics and theory of every part. In this complete Metasploit course you will learn,

  • Basics Of Metasploit

  • Learn and Understand Metasploit

  • Hacking using Metasploit

  • Launching Attacks Using Metasploit

  • Intelligence Gathering and Scanning

  • Vulnerability Scanning

  • Metasploit Auxiliary Modules

  • Meterpreter

  • Meterpreter Scripting

  • Karmetasploit

  • WiFi Hacking

  • Password Hacking

  • Social Engineering Hacking

  • Creating Undetectable Backdoors and Using Rootkits

  • Privilege Escalation

  • Controlling Victim

  • Using Metasploit and Kali Linux Together

  • Advanced Hacking Using Metasploit

In every part first you shall learn the basics and theory then we will cover the main topics.

Who this course is for:
  • Anybody who want to learn about Metasploit
  • Anybody who want to learn about Ethical Hacking
  • Anybody who want to learn about Cyber Security
  • Anybody who want to learn about Certified Ethical Hacking
  • Anybody who want to boost their It career
Course content
Expand all 30 lectures 02:40:11
+ Learn Metasploit From Scratch
9 lectures 47:46
Intelligence Gathering and Scanning
05:22
Vulnerability Scanning - Part 1
06:01
Vulnerability Scanning - Part 2
05:39
Metasploit Auxiliary Modules - Part 1
05:01
Metasploit Auxiliary Modules - Part 2
05:07
Meterpreter and Metasploit Auxiliary Module - Part 1
05:21
Meterpreter and Metasploit Auxiliary Module - Part 2
05:21
Meterpreter Scripting
04:59
Karmetasploit and Meterpreter Scripting
04:55
+ Hacking using Metasploit
8 lectures 42:12
Creating Your Own Exploits - Part 1
05:11
Creating Your Own Exploits - Part 2
05:11
Creating Your Own Exploits - Part 3
05:29
Exploitation Using Client Side Attacks - Part 1
05:32
Exploitation Using Client Side Attacks - Part 2
05:21
Exploiting Using Metasploit - Part 1
05:28
Exploiting Using Metasploit - Part 2
04:51
Exploiting Using Metasploit - Part 3
05:09
+ Launching Attacks Using Metasploit
11 lectures 59:05
WiFi Hacking - Part 1
05:52
WiFi Hacking - Part 2
05:52
Password Hacking - Part 1
05:29
Password Hacking - Part 2
05:21
Password Hacking - Part 3
05:29
Social Engineering Hacking
05:01
Creating Undetectable Backdoors and Using Rootkits - Part 1
05:43
Creating Undetectable Backdoors and Using Rootkits - Part 2
05:43
Privilege Escalation and Controlling Victim - Part 1
04:35
Privilege Escalation and Controlling Victim - Part 2
04:35
Using Metasploit and Kali Linux Together
05:25