COURSE

Metasploit

Course

Metasploit Framework is the most popular exploitation tool available for developing, testing, and performing exploits. This metasploit course will teach you to utilize the deep capabilities of Metasploit for penetration testing and help you to prepare to run vulnerability assessments for organizations of any size.
Full access included with 
Insider Pro
 and 
Teams

5

H

39

M
Time

intermediate

i
Designed for learners who have no prior work experience in IT or Cybersecurity, but are interested in starting a career in this exciting field.
Designed for learners with prior cybersecurity work experience who are interested in advancing their career or expanding their skillset.
Designed for learners with a solid grasp of foundational IT and cybersecurity concepts who are interested in pursuing an entry-level security role.
Experience Level

6

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this course

Read More

Skills you'll gain

Course Outline

1
Module 1 - Introduction & Kali Installation
0
H
23
Min
1
Module 2 - Metasploit Fundamentals
1
H
8
Min
1
Module 3 - Information Gathering
0
H
26
Min
1
Module 4 - Vulnerability Scanning
0
H
46
Min
1
Module 5 - Client Side Attacks
0
H
38
Min
1
Module 6 - Post Exploitation
0
H
56
Min
1
Module 7 - Maintaining Access
0
H
11
Min
1
Module 8 - Metasploit Extended Usage
0
H
37
Min
1
Module 9 - Using the Metasploit GUIs
0
H
32
Min

Part 1 - Exploring mimikatz

Free

11m

Part 1 - Keylogging with Keyscan

Free

4m

Part 1 - Explore Meterpreter

Free

4m

Part 1 - Intro

Free

7m

Part 1 - Login Attempt

Free

4m

Part 1.1 - Scanners

Free

10m

Part 1 - Update Kali

Free

2m

Part 1.1 - Introduction

Free

11m

Part 2 - Embedding Meterpreter in exe

Free

9m

Part 2 - Running Metasploit as a Service

Free

7m

Part 2 - Generating the Payload

Free

5m

Part 2 - Screenshot

Free

1m

Part 2 - VNC Scanner

Free

3m

Part 2 - Explore Metasploit Structure

Free

5m

Part 1.2 - Introduction

Free

5m

Part 3 - Privilege Escalation on Win7-32

Free

8m

Part 3 - Starting Handler for Reverse Shell

Free

10m

Part 3 - WMAP

Free

6m

Part 1.3 Scanners

Free

5m

Part 2 - Kali Installation

Free

6m

Part 3 - Metasploit Database

Free

2m

Part 3.2 - File Inclusion Vulnerabilities

Free

5m

Part 4 - Clearing Windows Event Logs

Free

4m

Part 4 - Establishing the Reverse Shell

Free

7m

Part 4 - WMAP Scan

Free

4m

Part 2 - Discovering Exploits

Free

2m

Part 4 - The msfconsole Interface

Free

13m

Part 5 - Using Incognito

Free

5m

Part 5 - Windows 7 Reverse Shell

Free

7m

Part 5.1 - Nessus

Free

7m

Part 3 - Discovering Services

Free

2m

Part 5 - Metasploit Payloads & Stagers

Free

2m

Part 6 - Persistent Backdoor with NetCat

Free

8m

Part 6 - Establishing the Win Shell

Free

2m

Part 5.2 - Nessus

Free

5m

Part 6 - Encoders

Free

15m

Part 7 - Remote Desktop Access with getgui

Free

10m

Part 5.3 - Nessus

Free

10m

Part 7 - Database Commands

Free

7m

Part 8 - Sniffing the VICTIM's Packets

Free

4m

Part 5.4 - Nessus

Free

8m

Part 8.1 - Meterpreter

Free

11m

Part 9 - Port Forwarding

Free

5m

Part 8.2 - Meterpreter

Free

10m

Part 10 - Changing File Attributes with Timestomp

Free

4m

Part 11 - Using the Search Function

Free

3m

Part 1 - Exploring mimikatz

11m

Module 8 - Metasploit Extended Usage
Part 1 - Keylogging with Keyscan

4m

Module 7 - Maintaining Access
Part 1 - Explore Meterpreter

4m

Module 6 - Post Exploitation
Part 1 - Intro

7m

Module 5 - Client Side Attacks
Part 1 - Login Attempt

4m

Module 4 - Vulnerability Scanning
Part 1.1 - Scanners

10m

Module 3 - Information Gathering
Part 1 - Update Kali

2m

Module 2 - Metasploit Fundamentals
Part 1.1 - Introduction

11m

Module 1 - Introduction & Kali Installation
Part 2 - Embedding Meterpreter in exe

9m

Module 8 - Metasploit Extended Usage
Part 2 - Running Metasploit as a Service

7m

Module 7 - Maintaining Access
Part 2 - Generating the Payload

5m

Module 5 - Client Side Attacks
Part 2 - Screenshot

1m

Module 6 - Post Exploitation
Part 2 - VNC Scanner

3m

Module 4 - Vulnerability Scanning
Part 2 - Explore Metasploit Structure

5m

Module 2 - Metasploit Fundamentals
Part 1.2 - Introduction

5m

Module 1 - Introduction & Kali Installation
Part 3 - Privilege Escalation on Win7-32

8m

Module 6 - Post Exploitation
Part 3 - WMAP

6m

Module 4 - Vulnerability Scanning
Part 1.3 Scanners

5m

Module 3 - Information Gathering
Part 2 - Kali Installation

6m

Module 1 - Introduction & Kali Installation
Part 3 - Metasploit Database

2m

Module 2 - Metasploit Fundamentals
Part 3.2 - File Inclusion Vulnerabilities

5m

Module 8 - Metasploit Extended Usage
Part 4 - Clearing Windows Event Logs

4m

Module 6 - Post Exploitation
Part 4 - Establishing the Reverse Shell

7m

Module 5 - Client Side Attacks
Part 4 - WMAP Scan

4m

Module 4 - Vulnerability Scanning
Course Description

Take an in-depth look at the Metasploit Framework so that you can be confident that you are using this tool to its fullest capabilities. Metasploit's capabilities are wide, and this class will help you to prepare to run vulnerability assessments for organizations of any size. Here is what the class will cover: Fundamentals about the framework Framework organization How to install it How to contribute Usage Msfconsole Msfcli Msfvenom Resource Files Scanning Port scanning Vulnerability scanning Exploitation Network based exploit Client side exploit Browser Autopwn Local exploits Post Exploitation Meterpreter Meterpreter scripts Post exploitation modules Pivoting Privilege Escalation Information Gathering Avoiding Detection Writing Metasploit Modules Writing an exploit module Writing an auxiliary module Writing a post exploitation module Meterpreter scripting Railgun *Are you hoping to [become a penetration tester](https://www.cybrary.it/become-penetration-tester/)? This course could take you one more step down your career path toward your goal. Sign up for Cybrary's Career Path program today!*

What is Metasploit?

Metasploit Framework, created by the Metasploit Project, is the mot popular exploitation tool available for developing, testing, and performing exploits. It allows penetration testers, auditors, and vulnerability assessment personnel to create their own penetration testing systems and exploit modules.

What Does this Metasploit Course Cover?

Cybrary's online Metasploit course will help you learn how to use the Metasploit Framework software for penetration testing. The goal of this course is to ensure that users are taking advantage of all that the platform has to offer. When you have completed the class, you will have in-depth knowledge of the Metasploit software, and you will be ready to offer your organization even better security and protection from cyber attacks. The course covers the following Metasploit topics: - Fundamentals about Metasploit Framework

  • Usage
  • Scanning
  • Exploitation
  • Post Exploitation
  • Writing Metasploit Modules
  • In this course you will learn to use the Metasploit framework platform, how to perform penetration tests on applications and databases, how to perform attacks and test vulnerabilities, and how to take control over working computers. This course has a total of 5 hrs. 39 min. clock hours. Upon finishing the course, you will receive a Certificate of Completion.

    Are There Prerequisites for the Metasploit Training?

    There are no prerequisites for this course and you do not have to have programming skills or IT work experience. This is a course that is useful to IT security beginners as well as those already in a cybersecurity position. It is recommended that you have general IT knowledge and it is good to be familiar with Linux/Unix OS (but this isn't required).

    Who Should Take the Metasploit Training?

    Every current penetration tester should have knowledge of Metasploit. Additionally, it is useful for: - Future penetration testers

  • Vulnerability assessment personnel
  • Security Engineers
  • Security Researchers
  • Auditors
  • Programmers
  • Any IT professional who has to test regularly to maintain compliance requirements
  • Any IT professional who runs scheduled testing of security infrastructure as a best practice
  • Why Take this Metasploit Course?

    Whether you are currently working in the cybersecurity field or just beginning your IT career, taking the Metasploit training course will be beneficial to you in various ways. It is a tool that has the potential to achieve the same power as other pricey commercial tools. If you are new to the IT industry, perhaps just embarking on your career, you need to know Metasploit. The training course will teach you how to utilize the software platform to conduct attacks, identify vulnerabilities, and patch them. Metasploit is a platform that you will likely be expected to be familiar with as you search for employment, as most IT organizations do use it. If you are currently working in a cybersecurity role, this course offers you additional knowledge that will enhance your penetration testing skills. While you may already have some familiarity with Metasploit, our online course will still be beneficial to you because it's estimated that users only rely on about 10 percent of the platform's functionality. This course will help you completely master that 10 percent, while introducing you to the additional 90 percent of Metasploit's features that you are not currently taking advantage of. This will not only increase your overall knowledge, it will improve the efficacy of your testing and ability to protect your company's information, making you even more valuable to your organization.

    Train Your Team

    Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

    Included in a Path

    Instructors

    Dean Pompilio
    CEO of SteppingStone Solutions
    Read Full Bio
    Learn

    Learn core concepts and get hands-on with key skills.

    Practice

    Exercise your problem-solving and creative thinking skills with security-centric puzzles

    Prove

    Assess your knowledge and skills to identify areas for improvement and measure your growth

    Get Hands-on Learning

    Put your skills to the test in virtual labs, challenges, and simulated environments.

    Measure Your Progress

    Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

    Connect with the Community

    Connect with peers and mentors through our supportive community of cybersecurity professionals.

    Success from Our Learners

    "Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

    Cassandra

    Information Security Analyst/Cisco Systems

    "I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

    Casey

    Cyber Systems Engineer/BDO

    "Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

    Angel

    Founder,/ IntellChromatics.

    "Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

    Don Gates

    Principal Systems Engineer/SAIC

    "Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

    Cory

    Cybersecurity analyst/

    "I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

    Mike

    Security Engineer and Pentester/

    "Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

    Cassandra

    Information Security Analyst/Cisco Systems

    "I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

    Casey

    Cyber Systems Engineer/BDO

    "Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

    Angel

    Founder,/ IntellChromatics.

    Metasploit

    Metasploit Framework is the most popular exploitation tool available for developing, testing, and performing exploits. This metasploit course will teach you to utilize the deep capabilities of Metasploit for penetration testing and help you to prepare to run vulnerability assessments for organizations of any size.
    5
    39
    M
    Time
    intermediate
    difficulty
    6
    ceu/cpe

    Course Content

    Course Description

    Take an in-depth look at the Metasploit Framework so that you can be confident that you are using this tool to its fullest capabilities. Metasploit's capabilities are wide, and this class will help you to prepare to run vulnerability assessments for organizations of any size. Here is what the class will cover: Fundamentals about the framework Framework organization How to install it How to contribute Usage Msfconsole Msfcli Msfvenom Resource Files Scanning Port scanning Vulnerability scanning Exploitation Network based exploit Client side exploit Browser Autopwn Local exploits Post Exploitation Meterpreter Meterpreter scripts Post exploitation modules Pivoting Privilege Escalation Information Gathering Avoiding Detection Writing Metasploit Modules Writing an exploit module Writing an auxiliary module Writing a post exploitation module Meterpreter scripting Railgun *Are you hoping to [become a penetration tester](https://www.cybrary.it/become-penetration-tester/)? This course could take you one more step down your career path toward your goal. Sign up for Cybrary's Career Path program today!*

    What is Metasploit?

    Metasploit Framework, created by the Metasploit Project, is the mot popular exploitation tool available for developing, testing, and performing exploits. It allows penetration testers, auditors, and vulnerability assessment personnel to create their own penetration testing systems and exploit modules.

    What Does this Metasploit Course Cover?

    Cybrary's online Metasploit course will help you learn how to use the Metasploit Framework software for penetration testing. The goal of this course is to ensure that users are taking advantage of all that the platform has to offer. When you have completed the class, you will have in-depth knowledge of the Metasploit software, and you will be ready to offer your organization even better security and protection from cyber attacks. The course covers the following Metasploit topics: - Fundamentals about Metasploit Framework

  • Usage
  • Scanning
  • Exploitation
  • Post Exploitation
  • Writing Metasploit Modules
  • In this course you will learn to use the Metasploit framework platform, how to perform penetration tests on applications and databases, how to perform attacks and test vulnerabilities, and how to take control over working computers. This course has a total of 5 hrs. 39 min. clock hours. Upon finishing the course, you will receive a Certificate of Completion.

    Are There Prerequisites for the Metasploit Training?

    There are no prerequisites for this course and you do not have to have programming skills or IT work experience. This is a course that is useful to IT security beginners as well as those already in a cybersecurity position. It is recommended that you have general IT knowledge and it is good to be familiar with Linux/Unix OS (but this isn't required).

    Who Should Take the Metasploit Training?

    Every current penetration tester should have knowledge of Metasploit. Additionally, it is useful for: - Future penetration testers

  • Vulnerability assessment personnel
  • Security Engineers
  • Security Researchers
  • Auditors
  • Programmers
  • Any IT professional who has to test regularly to maintain compliance requirements
  • Any IT professional who runs scheduled testing of security infrastructure as a best practice
  • Why Take this Metasploit Course?

    Whether you are currently working in the cybersecurity field or just beginning your IT career, taking the Metasploit training course will be beneficial to you in various ways. It is a tool that has the potential to achieve the same power as other pricey commercial tools. If you are new to the IT industry, perhaps just embarking on your career, you need to know Metasploit. The training course will teach you how to utilize the software platform to conduct attacks, identify vulnerabilities, and patch them. Metasploit is a platform that you will likely be expected to be familiar with as you search for employment, as most IT organizations do use it. If you are currently working in a cybersecurity role, this course offers you additional knowledge that will enhance your penetration testing skills. While you may already have some familiarity with Metasploit, our online course will still be beneficial to you because it's estimated that users only rely on about 10 percent of the platform's functionality. This course will help you completely master that 10 percent, while introducing you to the additional 90 percent of Metasploit's features that you are not currently taking advantage of. This will not only increase your overall knowledge, it will improve the efficacy of your testing and ability to protect your company's information, making you even more valuable to your organization.

    This course is part of a Career Path:
    No items found.

    Instructed by

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Metasploit Certificate of Completion