Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
LAST COURSE UPDATE: OCTOBER, 2016
Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.
Welcome to IT Secutiry Academy! IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you've ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You're welcome to join us and start your training now.
About the training
Learn the most popular pentesting framework: METASPLOIT.
If you are thinking about IT security seriously - you need to know Metasploit. Learn how to use it, how to conduct an attack, how to find vulnerabilities and patch them.
Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit.
First complete training explained from scratch. You will see on step-by-step presentations what to do. IT Security Adacemy Expert will explain how it works and how to use Metasploit.
Take your IT sec knowledge to the next level.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Introduction to Metasploit|
Metasploit - what's that?Preview
What do you need during the training
Deep introduction to Metasploit frameworkPreview
|Section 2: Metasploit in practice|
Working with Metasploit modules
Conducting penetration tests
|Section 3: Conducting attacks and testing vulnerabilities|
Attack types that works
|Section 4: Metasploit for professionals|
Taking control over working machines
IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.
The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.
We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.