Penetration Testing with Metasploit Ethical hacking stream

Learn and Expertise METASPLOIT Framework Tool
2.9 (4 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
47 students enrolled
$20
Take This Course
  • Lectures 60
  • Contents Video: 5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 10/2014 English

Course Description

From Wikipedia: The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research. The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.

95% of Security professionals use distribution like Kali Linux/Backtrack which consists tons of tools that aids pentesters to perform audits and Metasploit Framework is highly sophisticated tool. The course is designed as a complete guide to understand and handle Metasploit Tool efficiently in real time.

This is online certification Course by InSEC-Techs and your doubts related to the subject are solved for ever on discussion board. We provide you material and references to get more understanding and learning this tool.

The course is very well structured, explaining the terminologies , functionality and lab practicals are very well shown as feeding baby a banana.

What are the requirements?

  • Must have basic understanding on Ethical Hacking Subject
  • Must have downloaded and installed Metasploit Framework Tool

What am I going to get from this course?

  • By the End of this course, you will gain expersie in working with Metasploit Framework Tool
  • Students will be able to test/ perform security audits/penetration testing efficiently with Metasploit tool alone.

What is the target audience?

  • Computer Science Students
  • IT Security Auditors
  • Ethical Hacking studying students

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Penetration Testing with Metasploit : Introduction
Introduction to PENETRATION TESTING with METASPLOIT
Preview
03:31
Introduction to PENETRATION TESTING
Preview
01:53
Introduction PENETRATION TESTING Execution Standard
Preview
01:12
PENETRATION TESTING Execution Standard
Preview
03:15
Section 2: Lab
Lab Setup
Preview
03:50
LabSetup Live Mode
04:11
Instaling Kali Linux
02:57
Configuring Third party Vulnerable TestBeds
02:57
Snapshot and Cloning
04:32
Section 3: Metasploit 101
METASPLOIT 101
04:48
Auxilary Scanning
02:55
Introduction to Exploits
03:27
Excellent Ranking Exploits
05:01
Great Ranking Exploits
01:55
Normal Ranking Exploits
02:38
Payloads
03:03
Creating Database Connectivity
04:56
Nessus Installation
04:36
Nessus Scanning
04:14
Exploiting Vulnerabilies based on NESSUS report
03:51
Msfconsole
04:29
Msfcli
02:33
Armitage
06:21
Meterpreter
01:39
Working with Meterpreter
04:45
Working With Meterpreter 2: Getting Access
05:33
Core Commands : Meterpreter
08:38
File Commands : Meterpreter
07:54
User Interface Commands: Meterpreter
09:41
System Commands: Meterpreter
09:45
Networking Commands: Meterpreter
01:40
Changing MAC Attributes
11:44
Introduction to Client-Side Attacks
02:23
Msfpayload, Msfencode, Msfvenom
01:48
Binary Payload
06:28
Working with VNC Binary Payload
04:04
VNC payload - Shell Disable
01:03
Linux Binary Payload
04:14
Stage 2 Linux Binary Payload
07:01
Exploiting MS Office Docs
06:22
Exploiting PDF Vulnerabilities
06:12
Persistent Backdoors
04:09
Exploiting Software Misconfiguration
06:52
Exploiting Fully Patched Machine
06:39
Browser Based Exploitation
07:03
Installing & Configuring BeEF
07:03
Working with BeEF Modules
05:21
Loading MSF Modules into BeEF
04:37
SET Installation
03:35
Introduction to Social Engineering
12:24
Tabnabbing Attacks
08:21
WebJacking
03:14
Armitage Installation
05:57
Post Exploitation over Meterpreter
04:02
Viel Framework Installation
03:10
Evading AntiVirus using Veil Framwork
06:42
Integerating Veil script into Armitage
02:12
Exploiting Victims machine using Armitage with Veil
03:34
Exploiting Victim Machine using customized powershell script
03:48
Installing Android Virtual Testbed.
06:37

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

InSEC- Techs, Information Security Technologies

InSEC-Techs (Information Security Technologies) www insectechs dot in is an integrated single-source IT training company providing classroom and distance courses like PHP, Ethical Hacking, Web Application Penetration Testing, Python, C language, Perl, CCNA and web development firm with uniquely competent, professional and creative website designing & internet marketing company providing full featured internet marketing solutions and web services including B2B & B2C e-commerce solutions which also acts as an offshore development center for overseas development firms to help them optimize their business significance in the global market- With one phone call you get a team of highly-skilled experts with a business-driven common-sense approach-

InSEC-Techs ensure that individual care is taken in classroom while conducting sessions- We will not have more than seven students per batch in a single session to shoot more concentration on each student-

Kiran Thirukovela, 31 years old Cyber-techie and Cheif Executive Officer (CEO) of InSEC-Techs (Information Security Technologies)

Dropped out B-Techs (ECE) by choice and B-SC (Computer Science)and stepped into the world of Computers and networking- Kiran holds IT certification like
MCSA: Microsoft Certified System Administrator
CCNA: Cisco Certified Network Administrator
IINS: Implementing IOS Network Security Expert
CCNP: Cisco Certified Network Professional
CCNP-Sec: Cisco Certified Network Professional Security
CCSP: Cisco Certified SecurityProfessional
AFCEH: Ankit Fadia Certified Ethical Hacker
CHFI: Computer Hacking Forensic Investigator

Kiran has authored book "Cyber Crimes Investigation" with co-author Mr- Benild Joseph- A Book written for law enforcement agencies in india- Kiran is Network Security professional with 5+ years of experience and 3+ years of as Ethical Hacking trainer-
He specializes in Web Application security, Penetration testing and Forensic investigation and solved cyber crime cases in India and kenya-

Nipun:

Nipun is well-known IT security Researcher, Well Known for his activities in the field of ethical hacking and cyber forensics - Mr- Nipun was an Independent security expert , who works on cyber crime cases and investigations , he was the Ex-C-T-O in Secugenius Security Solutions , Also He Worked As A Security Analyst in a Company - During His Career He has Pen-tested over 100+ Servers And Solved Many Cyber Crime Cases ,
He Has Trained Over 5000+ students in the field of ethical hacking and penetration testing , he is the currently the ambassador for EC-COUNCIL Programs In Lovely Professional University (First Indian University To Tie Up With EC-COUNCIL)- He is Currently Pursuing Masters In Technology (M-TECH) From LPU Itself - He Has Been The Speaker At Several National Level Confrences - His Security Research Papers Are Published Over Many Sites Like Packetstorm, SourceForge Etc-

Achievements of His Careers:

a- Certified Ethical Hacker (EC-COUNCIL C|EH)
b- Certified Information Security Expert (CISE)
c- Ankit Fadia's Certified Ethical Hacker (AFCEH 5-0)
d- Winner Of Innobuzz Best Blog Competition (2010)
e- Ambassador Of EC-COUNCIL @ Lovely Professional University
f- Ex- Chief Technical Officer At Secugenius Security Solutions
g- Ex- Security Analyst At Cyber Cure Solutions Delhi
h- Founder/Admin Of Starthack.
i- Founder/Admin Of Indian Cyber Police (Among Most Active HAcker's group of india)
j- Administrator of various Forum
k- Admin Of Hacker's Group Ap3x_nd_h4ck0
l- Respected V-I-P Member Of International Hacker's Forum (MADLEETS Pakistan)

m- Presenter At HATCON LPU & HATCON KANPUR

n- Presenter At DEFCON Groups (DC141001)

1-Defcon Rajasthan :
2- Defcon Punjab :

o- Presently writing two books On Web application Hacking And Metasploit Framework

p- Trained Over 5000 Students And Delivered Over 50+ Workshops

q- Worked On Cyber Crime Cases-

r- Secured Over 1000 Domains

s- Regular Author At Packet Storm Security.

Bio: Mr- Srinivas

Mr- Srininvas is Security Analyst and Ethical Hacking Trainer Since 6 Years and addressed over 50 workshops and Seminars- He is Co-Author of the Book "Hacking S3crets", along with Sai Satish and Aditya Gupta-

Srininvas is also moderator of famous Hacking Forum based website andhrahackers and contributed SQL Injection articles to World's leading hacking magazine "hackin9"-

Srininvas was honoured with "PRATHIBHA" Award by Govt- of Andhra Pradesh in Year 2008-

Ready to start learning?
Take This Course