Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Personal Transformation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Blogging Freelancing Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Metasploit

Metasploit Framework: Penetration Testing with Metasploit

Become Hacker: Learn ethical hacking and penetration testing using Metasploit and start your cyber security career
Bestseller
Rating: 4.6 out of 54.6 (403 ratings)
3,179 students
Created by Oak Academy, Muharrem AYDIN
Last updated 2/2021
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Become an Expert in Using Metasploit
  • Learn Ethical Hacking from scratch with Metasploit
  • Importance of Penetration Testing
  • Types of Penetration Testing
  • Basics of Penetration Testing
  • Metasploit Filesystem and Libraries
  • The Architecture of MSF
  • Auxiliary Modules
  • Payload Modules
  • Exploit Modules
  • Encoder Modules
  • Post Modules
  • Metasploit Community
  • Metasploit Interfaces
  • Armitage
  • MSFconsole
  • Enumeration
  • Nmap Integration and Port Scanning
  • SMB and Samba Enumeration
  • MySQL Enumeration
  • FTP Enumeration
  • SSH Enumeration
  • HTTP Enumeration
  • SNMP Enumeration
  • MTP Enumeration
  • Using Shodan with MSF
  • Vulnerability Scanning
  • Exploitation and Gaining Access
  • Post-exploitation-Meterpreter
  • Meterpreter Commands
  • Pass The Hash with Metasploit
  • John the Ripper Module
  • Meterpreter Python/Powershell Extension
  • Antivirus Evasion and Cleaning
  • MSFvenom
  • Using Custom Payload Generators
  • Deceiving File System Using Timestomp
  • The very latest up-to-date information and methods
  • During the course you will learn both the theory and how to step by step setup each method
Curated for the Udemy for Business collection

Requirements

  • Be able to download and install all the free software and tools needed to practice
  • A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world
  • Just you, your computer and your ambition to get started now!

Description

Hi there,

Welcome to "Metasploit Framework: Penetration Testing with Metasploit" course.

In this course, you will learn ethical hacking with the best ethical hacking distribution Kali, and the tool: Metasploit.

This is not a pure Penetration Testing course but Complete Penetration Testing with Metasploit course.

In this course, you will learn the capabilities of the Metasploit Framework while you are doing a penetration test.

No Previous Knowledge is needed!

You don’t need to have previous knowledge about all. This course will take you from a beginner to a more advanced level with hands-on examples.

Learn the famous hacking framework Metasploit

We will start with the very basics. First, you will learn to set up a laboratory. Then you will learn

-how to scan vulnerabilities

-gain full access to computer systems

-to discover the weaknesses and vulnerabilities and at the end of the course, you will become a Metasploit pro.

We will be conducting penetration testing only with Metasploit Framework and by doing so, we want to show you how to use the framework and cover as much as modules that I can.

Hands-On Course

From open-source research and information gathering to the exploitation and covering of their tracks, you will learn hands-on techniques to probe your network for vulnerabilities and understand how they are exploited. You will learn to think like a hacker in order to thwart black hat hackers future attacks on your networks.

Here is the list of what you’ll learn by the end of course,

  • Penetration Testing with Metasploit

  • Why the Metasploit Framework? aka: MSF

  • Metasploit Filesystem and Libraries

  • Enumeration

  • Vulnerability Scanning

  • Exploitation and Gaining Access

  • Post-exploitation-Meterpreter

  • Antivirus Evasion and Cleaning

Fresh Content

It’s no secret how technology is advancing at a rapid rate. New tools are released every day, and it’s crucial to stay on top of the latest knowledge for being a better security specialist. You will always have up-to-date content to this course at no extra charge.

Video and Audio Production Quality

All our contents are created/produced as high-quality video/audio to provide you the best learning experience.

You will be,

  • Seeing clearly

  • Hearing clearly

  • Moving through the course without distractions

You'll also get:

✔ Lifetime Access to The Course

✔ Fast & Friendly Support in the Q&A section

✔ Udemy Certificate of Completion Ready for Download

Dive in now!

We offer full support, answering any questions.

See you in the course!

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.


Who this course is for:

  • Anyone who wants to become Metasploit Superstar
  • Anyone who wants to learn Metasploit
  • Anyone who wants to learn Penetration Test with Metasploit
  • Anyone who wants to learn the tools to exploit vulnerabilities,
  • Anyone who wants to learn Metasploit as exploitation and post exploitation tool
  • Anyone who wants to learn "Pass the hash" method to compromise a Windows system with no vulnerability
  • Anyone who wants to learn how to crack password hashes
  • People who are willing to make a career in Cyber Security
  • Anyone already in Cybersecurity but needs a up-to-date and good refresher
  • Anyone who are beginner but wants to become expert

Course content

9 sections • 99 lectures • 7h 28m total length

  • Preview03:19
  • Preview05:33
  • Importance of Penetration Testing
    03:15
  • Basics of Penetration Testing
    02:18
  • Types of Penetration Testing
    03:38
  • Penetration Testing Execution Standard
    05:39

  • Requirements ( Like Storage. Processor )
    02:44
  • Enabling Virtualization (VT-x or AMD-V) in BIOS
    00:42
  • Installing VirtualBox
    04:21
  • Updates for Kali Linux 2020
    00:23
  • Installing Kali Linux
    08:04
  • Installing Metasploitable 2
    04:32
  • Installing Metasploitable 3: Packer
    05:47
  • Installing Metasploitable 3: Vagrant and Plugins
    04:14
  • Installing Metasploitable 3: VM Creation with Vagrant
    06:21
  • Vagrant Troubleshooting
    00:32
  • Downloading and Installing Free Windows
    00:20
  • Downloading and Installing Free Windows 7 and Windows 10
    02:57
  • Preview02:05

  • Evolution of Metasploit
    04:18
  • Metasploit Filesystem and Libraries
    04:31
  • The Architecture of MSF
    01:43
  • Auxiliary Modules
    04:36
  • Payload Modules
    06:00
  • Exploit Modules
    03:33
  • Encoder Modules
    02:35
  • Post Modules
    03:24
  • Metasploit Editions
    04:02
  • Metasploit Community
    03:08
  • Metasploit Interfaces
    04:50
  • Armitage
    03:16
  • MSFconsole
    04:53
  • MSFConsole Basic Commands 1
    06:44
  • MSFConsole Basic Commands 2
    07:59
  • MSFConsole Basic Commands 3
    03:32
  • Using Databases in MSF 1
    05:42
  • Using Databases in MSF 2
    03:14
  • More on Exploits in MSF
    03:14
  • What's new in Metasploit Framework 5.0?
    01:00

  • What is Enumeration?
    02:03
  • Preview06:17
  • SMB and Samba Enumeration
    05:40
  • MySQL Enumeration
    03:40
  • FTP Enumeration
    04:15
  • SSH Enumeration
    02:30
  • HTTP Enumeration
    06:02
  • SNMP Enumeration
    03:43
  • MTP Enumeration
    03:49
  • Using Shodan with MSF
    04:58

  • Intro to Vulnerability Scanning
    03:50
  • Nessus® Home vs Nessus® Essentials
    00:52
  • Downloading and Installing Nessus Home
    05:42
  • Vulnerability Scanning with Nessus Home
    Preview06:56
  • Integrating Nessus into MSF
    04:40

  • Metasploit as Exploitation Tool
    01:52
  • Distributed Ruby Remote Code Execution (drb_remote_codeexec)
    03:14
  • PHP CGI Argument Injection (php_cgi_arg_injection)
    03:08
  • MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
    03:55
  • Java JMX Server Insecure Configuration Java Code Execution (java_jmx_server)
    03:03
  • Elastic Search Dynamic Script Arbitrary Java Execution (script_mvel_rce)
    03:11
  • Sun/Oracle GlassFish Server Authenticated Code Execution (glassfish_deployer)
    05:38
  • Jenkins-CI Script-Console Java Execution (jenkins_script_console)
    05:42
  • WinRM Script Exec Remote Code Execution (winrm_script_exec)
    04:00
  • HTTP Writable Path PUT/DELETE File Access (http_put)
    05:00
  • Exploiting Poorly Configured MySQL Service
    03:08
  • Axis2 / SAP Business Objects Authenticated Code Execution via SOAP
    04:44
  • Using Allports Payload
    06:17
  • Using Resource Files
    06:40

  • Post-Exploitation: Meterpreter
    02:18
  • Meterpreter
    03:00
  • Basic Meterpreter Commands 1
    Preview06:10
  • Basic Meterpreter Commands 2
    03:33
  • Basic Meterpreter Commands 3
    04:46
  • Privilege Escalation
    08:23
  • Extracting Password Hashes
    04:59
  • John the Ripper Module
    01:33
  • Pass The Hash with Metasploit
    05:46
  • Token Impersonation
    05:45
  • Extracting Cleartext Passwords
    09:47
  • Visual Interaction with the Target
    03:47
  • Enabling Remote Desktop
    05:22
  • Searching for Critical Information
    05:48
  • Packet Sniffing
    06:22
  • Pivoting
    10:02
  • Port Forwarding
    07:45
  • Meterpreter Scripts
    04:25
  • Meterpreter Python / Powershell Extension
    08:06
  • Maintaining Access
    01:58
  • Interacting with the Registry
    06:37
  • Keylogging
    07:04
  • Meterpreter Backdoor and Persistency Modules
    09:34

  • Antivirus Evasion and Cleaning
    02:46
  • MSFvenom
    07:06
  • MSFVenom: Using Encoders
    04:12
  • MSFVenom: Using Custom Executable Template
    05:31
  • Using Custom Payload Generators
    08:33
  • Cleaning Events and Security Management Logs
    03:35
  • Deceiving File System Using Timestomp
    06:06

  • BONUS
    04:08

Instructors

Oak Academy
LONG LIVE TECH KNOWLEDGE
Oak Academy
  • 4.3 Instructor Rating
  • 3,647 Reviews
  • 25,247 Students
  • 152 Courses

Hi there,

By 2024, there will be more than 1 million unfilled computing jobs and the skills gap is a global problem. This was our starting point.

At OAK Academy, we are the tech experts who have been in the sector for years and years. We are deeply rooted in the tech world. We know the tech industry. And we know the tech industry's biggest problem is the “tech skills gap” and here is our solution.

OAK Academy will be the bridge between the tech industry and people who

-are planning a new career

-are thinking career transformation

-want career shift or reinvention,

-have the desire to learn new hobbies at their own pace

Because we know we can help this generation gain the skill to fill these jobs and enjoy happier, more fulfilling careers. And this is what motivates us every day.

We specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to our practical alignment we are able to constantly translate industry insights into the most in-demand and up-to-date courses,

OAK Academy will provide you the information and support you need to move through your journey with confidence and ease.

Our courses are for everyone. Whether you are someone who has never programmed before, or an existing programmer seeking to learn another language, or even someone looking to switch careers we are here.

OAK Academy here to transforms passionate, enthusiastic people to reach their dream job positions.

If you need help or if you have any questions, please do not hesitate to contact our team.

Muharrem AYDIN
Computer Engineer, Cyber Security Expert, IT Lawyer
Muharrem AYDIN
  • 4.3 Instructor Rating
  • 7,333 Reviews
  • 47,332 Students
  • 20 Courses

After 20+ years of software engineering experience with titles of software developer, product manager, and integration architect, I have been working in cyber security domain for last 15 years. I am not only a cyber security expert but also the head and kick-starter of a cyber security consultancy unit. 

In security field, I have performed dozens of penetration tests for institutes from different sectors: finance, military, state agencies, and telcos.

I have been consulting different companies in security field which includes global banks such as ING Bank, HSBC, CitiBank and more.

In addition, I am an adjunct instructor in a university and teaching cyber security for years.

I involved in technical areas and has taken responsibilities in: 

Penetration tests (Pentests) and security audits

Cyber security training & consultancy

Source code analysis & secure software development

Cyber security incident response

Information security management system (ISMS) consultancy 

Open source cyber security systems, such as OpenVAS, OSSEC, OSSIM, Snort, Suricata, mod security

I'm creating my courses by using my know-how and 10 years of experience. As a result, our first course "Hacking Web Applications and Penetration Testing: Fast Start!" has gained "Best Seller" reputation in its category. 

I have risen a lot of cyber security experts from scratch, and you are the next.


  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.