
Train On-Demand
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreThe Metasploit Framework is one of the most widely used exploitation tools used by penetration testers and security researchers. This course will introduce you to the Metasploit framework and will teach you how to utilize the framework for penetration testing and vulnerability assessments.
Instructor for this course
Alexis Ahmed
Course Introduction
Introduction to the Metasploit Framework
Metasploit Framework Architecture
Penetration Testing With The Metasploit Framework
Installing & Configuring The Metasploit Framework
MSFconsole Fundamentals
Creating & Managing Workspaces
Port Scanning & Enumeration With Nmap
Importing Nmap Scan Results Into MSF
Windows Recon: Nmap Host Discovery
Port Scanning With Auxiliary Modules
FTP Enumeration
T1046 : Network Service Scanning
SMB Enumeration
Web Server Enumeration
Samba Recon: Basics
MySQL Enumeration
Apache Enumeration
SSH Enumeration
MySQL Enumeration
SMTP Enumeration
SSH Login
Vulnerability Scanning With MSF
Postfix Recon: Basics
Vulnerability Scanning With Nessus
Web App Vulnerability Scanning With WMAP
Generating Payloads With Msfvenom
Encoding Payloads With Msfvenom
Injecting Payloads Into Windows Portable Executables
Automating Metasploit With Resource Scripts
Exploiting A Vulnerable HTTP File Server
Windows: HTTP File Server
Exploiting Windows MS17-010 SMB Vulnerability
Exploiting WinRM (Windows Remote Management Protocol)
WinRM: Exploitation with Metasploit
Exploiting A Vulnerable Apache Tomcat Web Server
Windows: Java Web Server
Exploiting A Vulnerable FTP Server
Vulnerable FTP Server
Exploiting Samba
Vulnerable File Sharing Service
Exploiting A Vulnerable SSH Server
Vulnerable SSH server
Exploiting A Vulnerable SMTP Server
Vulnerable SMTP Server
Meterpreter Fundamentals
Upgrading Command Shells To Meterpreter Shells
Windows Post Exploitation Modules
Windows Privilege Escalation: Bypassing UAC
Windows Privilege Escalation:Token Impersonation With Incognito
Dumping Hashes With Mimikatz
Pass-the-Hash With PSExec
Establishing Persistence On Windows
Enabling RDP
Windows Keylogging
Clearing Windows Event Logs
Pivoting
Linux Post Exploitation Modules
Linux Privilege Escalation: Exploiting A Vulnerable Program
Dumping Hashes With Hashdump
Establishing Persistence On Linux
Port Scanning & Enumeration With Armitage
Exploitation & Post Exploitation With Armitage
Course Conclusion
Take your technical training into your own hands and stay engaged with our learn-by-doing platform where you can put your skills to the test with hands-on exercises, quizzes, and labs.
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreINE quizzes, labs, projects, and exercises help reinforce your knowledge.
Learn MoreOrganized training helps guide you through the most relevant subjects for certification prep.
Learn MoreWe add new courses and learning materials to the platform weekly so you're always up-to-date.
Learn MoreIf you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?