❗The content presented here is sourced directly from Udemy platform. For comprehensive course details, including enrollment information, simply click on the 'Go to class' link on our website.
Updated in [August 13th, 2023]
Skills and Knowledge Acquired:
By taking this course, participants will acquire the skills and knowledge necessary to use Metasploit, the world's most used penetration testing framework. This includes learning the fundamentals of ethical hacking, using popular security tools and techniques, running penetration tests with Kali and Nmap, and understanding auxiliary, payload, exploit, encoder, and post modules. Participants will also learn how to integrate Nmap and Metasploit, scan for vulnerabilities, exploit and gain access, and use post-exploitation with Meterpreter. Additionally, participants will gain an understanding of fuzzing, buffer overflow, keylogger, browser attack, shell to meterpreter, PowerShell, mp3 & mp4, and other related topics.
Contribution to Professional Growth:
This course contributes to professional growth by providing a comprehensive overview of the popular security tools and techniques used in penetration testing. It covers topics such as Metasploit, Nmap, vulnerability scanning, exploitation, and post-exploitation. Through hands-on examples, learners will gain the knowledge and skills necessary to become an expert in using Metasploit and other security tools. Additionally, the course provides an understanding of the cyber security threats and how to protect against them in a professional manner.
Suitability for Further Education:
This course is suitable for preparing further education in the field of penetration testing and ethical hacking. It covers the fundamentals of ethical hacking, as well as the popular security tools and techniques needed to run penetration tests with Kali and Metasploit. The course also covers topics such as vulnerability scanning, exploitation, and post-exploitation. Additionally, the course provides hands-on examples to help learners gain a better understanding of the topics.
Course Syllabus
Introduction
Metasploit framework
Intro msf
Scanning with Metasploit
Scanning WordPress with Metasploit
getting access with vsftpd
getting access with samba
getting access with Netcat
getting access with PowerShell
getting access with irc and distc
getting access with vnc and java
getting access with eternalblue
brute force attack
shell to meterpreter
set exploit on mp3 and mp4 file
maintaining access
Basic command in meterpreter
Meterpreter important commands
Create server file
Create backdoor file
Instructional commands
Sending and receive data
Compiling the program
change directory to target
Downloading file
Uploading file
Projects
Bonus part