Learning Outcome:
Requirement:
Course Curriculum
Penetration Testing with Metasploit : Introduction
Available in
days
days
after you enroll
Lab
Available in
days
days
after you enroll
Metasploit 101
Available in
days
days
after you enroll
-
Start
METASPLOIT 101
(4:50)
-
Start
Auxilary Scanning
(2:56)
-
Start
Introduction to Exploits
(3:28)
-
Start
Excellent Ranking Exploits
(5:03)
-
Start
Great Ranking Exploits
(1:55)
-
Start
Normal Ranking Exploits
(2:39)
-
Start
Payloads
(3:04)
-
Start
Creating Database Connectivity
(4:58)
-
Start
Nessus Installation
(4:38)
-
Start
Nessus Scanning
(4:16)
-
Start
Exploiting Vulnerabilies based on NESSUS report
(3:52)
-
Start
Msfconsole
(4:31)
-
Start
Msfcli
(2:34)
-
Start
Armitage
(6:23)
-
Start
Meterpreter
(1:39)
-
Start
Working with Meterpreter
(4:47)
-
Start
Working With Meterpreter 2: Getting Access
(5:35)
-
Start
Core Commands : Meterpreter
(8:40)
-
Start
File Commands : Meterpreter
(7:56)
-
Start
User Interface Commands: Meterpreter
(9:43)
-
Start
System Commands: Meterpreter
(9:47)
-
Start
Networking Commands: Meterpreter
(1:40)
-
Start
Changing MAC Attributes
(11:46)
-
Start
Introduction to Client-Side Attacks
(2:24)
-
Start
Msfpayload, Msfencode, Msfvenom
(1:48)
-
Start
Binary Payload
(6:30)
-
Start
Working with VNC Binary Payload
(4:06)
-
Start
VNC payload - Shell Disable
(1:03)
-
Start
Linux Binary Payload
(4:16)
-
Start
Stage 2 Linux Binary Payload
(7:03)
-
Start
Exploiting MS Office Docs
(6:23)
-
Start
Exploiting PDF Vulnerabilities
(6:14)
-
Start
Persistent Back doors
(4:11)
-
Start
Exploiting Software Misconfiguration
(6:54)
-
Start
Exploiting Fully Patched Machine
(6:41)
-
Start
Browser Based Exploitation
(7:05)
-
Start
Installing & Configuring BeEF
(7:05)
-
Start
Working with BeEF Modules
(5:23)
-
Start
Loading MSF Modules into BeEF
(4:39)
-
Start
SET Installation
(3:36)
-
Start
Introduction to Social Engineering
(12:26)
-
Start
Tabnabbing Attacks
(8:23)
-
Start
WebJacking
(3:15)
-
Start
Armitage Installation
(5:59)
-
Start
Post Exploitation over Meterpreter
(4:04)
-
Start
Viel Framework Installation
(3:11)
-
Start
Evading AntiVirus using Veil Framwork
(6:44)
-
Start
Integerating Veil script into Armitage
(2:13)
-
Start
Exploiting Victims machine using Armitage with Veil
(3:35)
-
Start
Exploiting Victim Machine using customized powershell script
(3:49)
-
Start
Installing Android Virtual Testbed.
(6:39)
-
StartMETASPLOIT 101 (4:50)
-
StartAuxilary Scanning (2:56)
-
StartIntroduction to Exploits (3:28)
-
StartExcellent Ranking Exploits (5:03)
-
StartGreat Ranking Exploits (1:55)
-
StartNormal Ranking Exploits (2:39)
-
StartPayloads (3:04)
-
StartCreating Database Connectivity (4:58)
-
StartNessus Installation (4:38)
-
StartNessus Scanning (4:16)
-
StartExploiting Vulnerabilies based on NESSUS report (3:52)
-
StartMsfconsole (4:31)
-
StartMsfcli (2:34)
-
StartArmitage (6:23)
-
StartMeterpreter (1:39)
-
StartWorking with Meterpreter (4:47)
-
StartWorking With Meterpreter 2: Getting Access (5:35)
-
StartCore Commands : Meterpreter (8:40)
-
StartFile Commands : Meterpreter (7:56)
-
StartUser Interface Commands: Meterpreter (9:43)
-
StartSystem Commands: Meterpreter (9:47)
-
StartNetworking Commands: Meterpreter (1:40)
-
StartChanging MAC Attributes (11:46)
-
StartIntroduction to Client-Side Attacks (2:24)
-
StartMsfpayload, Msfencode, Msfvenom (1:48)
-
StartBinary Payload (6:30)
-
StartWorking with VNC Binary Payload (4:06)
-
StartVNC payload - Shell Disable (1:03)
-
StartLinux Binary Payload (4:16)
-
StartStage 2 Linux Binary Payload (7:03)
-
StartExploiting MS Office Docs (6:23)
-
StartExploiting PDF Vulnerabilities (6:14)
-
StartPersistent Back doors (4:11)
-
StartExploiting Software Misconfiguration (6:54)
-
StartExploiting Fully Patched Machine (6:41)
-
StartBrowser Based Exploitation (7:05)
-
StartInstalling & Configuring BeEF (7:05)
-
StartWorking with BeEF Modules (5:23)
-
StartLoading MSF Modules into BeEF (4:39)
-
StartSET Installation (3:36)
-
StartIntroduction to Social Engineering (12:26)
-
StartTabnabbing Attacks (8:23)
-
StartWebJacking (3:15)
-
StartArmitage Installation (5:59)
-
StartPost Exploitation over Meterpreter (4:04)
-
StartViel Framework Installation (3:11)
-
StartEvading AntiVirus using Veil Framwork (6:44)
-
StartIntegerating Veil script into Armitage (2:13)
-
StartExploiting Victims machine using Armitage with Veil (3:35)
-
StartExploiting Victim Machine using customized powershell script (3:49)
-
StartInstalling Android Virtual Testbed. (6:39)
Your Instructor

InSEC-Techs
InSEC-Techs (Information Security Technologies) established 2010 April, is based in Hyderabad, INDIA, fastest growing IT Security training company with strong presence in 180+ countries and 3000+ students in Online & classroom formats delivering courses like ethical hacking ,web , metasploit, iOS and android penetration testing classroom and videos courses.
InSEC-Techs have completed 5 journey of training in above said subjects and has places hundreds of students in private and public sectors.
We conduct training programs as Classroom, Online instructor led and Online self paced video learning (e-learning) formats with online school hosted on EHacking.net
Reviews

5 months ago Infosec Leader
Exceptionally proficient teacher, who will deliberately disclose everything to guarantee your complete understanding. I appreciated the challenges which were presented with the goal that I could have an opportunity to give it a shot for myself rather than continually following along.

3 months ago Jaysen Batchelor
This course was extremely overwhelming to jump into, however the instructor makes an extraordinary effort in showing step by step explaining you with the devices and strategies at an early stage.

1 months ago Milos Montes
Excellent course.... the instructor helped keep me wanting to continue through all the lectures.

1 months ago Alexey Brenes
This was till now the best course I have had on EH Academy. The instructor does a great job! He teaches with great interest and has a rich educational knowledge.

6 months ago Anthony Falcon
This course is really engaging and the instructor was well prepared to deliver the content effectively.

9 months ago Benjamin Major
The instructor has a strong grasp of the subject and makes the learning fun with his antics. Have enjoyed all of this instructor’s courses.

8 months ago Chad Blair
I really liked this course because the instructor uses very basic but clear models to demonstrate a concept. It really helped me get a picture of what's happening throughout the course.

4 months ago Chris Dunavan
For me this was quite quick, but deep enough, course to get detailed knowledge. This class was very well organized and delivered, I enjoyed it.

3 months ago Cristian Drincu
Excellent!! I would recommend as "A Must" for students who are seeking quality course.

2 months ago Edwin-Torres-Sanchez
This is really good, building from beginner to amateur, so far - I've taken a lot from this course and actually am using the things I learn on a daily basis in my work.

6 months ago Glen Ihrig
The course is really engaging and an experiential learning.

7 months ago Hector-Toledo
Almost done with the course. Excellent all round. The course is well structured and the pace is just correct.

1 months ago Hector-Toledo
The instructor explains clearly each point, and he is concise and to the point. He uses practical and visual approach that makes concepts easy to understand and hard to forget.

2 months ago Juan John Charles
Very engaging presentation and manages to condense a lot of information into short periods but still makes it all understandable.

1 months ago Marcus Smith