Learn Penetration Testing from Scratch with METASPLOIT

Learn how to test security mechanisms and how to conduct penetration tests on working machines or databases.
3.7 (25 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,210 students enrolled
$100
Take This Course
  • Lectures 9
  • Contents Video: 3 hours
    Other: 16 mins
  • Skill Level Intermediate Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 3/2014 English

Course Description

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.

Welcome to IT Secutiry Academy! IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you've ever seen online and prepare you not only for certification exams, but also teach you pratical skills. You're welcome to join us and start your training now.

About the training

Learn the most popular pentesting framework: METASPLOIT.

If you are thinking about IT security seriously - you need to know Metasploit. Learn how to use it, how to conduct an attack, how to find vulnerabilities and patch them.

Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit.

First complete training explained from scratch. You will see on step-by-step presentations what to do. IT Security Adacemy Expert will explain how it works and how to use Metasploit.

Take your IT sec knowledge to the next level.

What are the requirements?

  • General IT Knowledge
  • Knowledge on the level of IT Security Beginner Training
  • No programming skills needed
  • Good to know how to use Linux/Unix OS

What am I going to get from this course?

  • Learn how to use Metasploit framework
  • How to conduct penetrating tests on databases and applications
  • Learn how to conduct attacks and test vulnerabilities
  • How to take control over working computer machines

What is the target audience?

  • Future Pentesters
  • IT Security Professionals
  • IT Security Hobbists
  • Graduates of our IT Security Beginner Training
  • Graduates of our IT Security Professional Training
  • Programmers

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction to Metasploit
Metasploit - what's that?
Preview
03:19
What do you need during the training
1 page
Deep introduction to Metasploit framework
Preview
35:07
Section 2: Metasploit in practice
Working with Metasploit modules
19:18
Conducting penetration tests
27:59
Section 3: Conducting attacks and testing vulnerabilities
Attack types that works
32:46
Databases attacks
17:20
Section 4: Metasploit for professionals
Taking control over working machines
30:50
Download notes
15 pages

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

IT Security Academy, IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Instructor Biography

Hacking School, IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

Ready to start learning?
Take This Course