Exclusive: Penetration Testing with Metasploit (E-Learning in English)

Medien

Exclusive: Penetration Testing with Metasploit (E-Learning in English)
Exclusive: Penetration Testing with Metasploit (E-Learning in English)

Beschreibung

Disclaimer: This e-learning course was fully translated with AI support. Subtitles are based on the original German version (see here). The video modules display the German user interface, but the spoken language is English, including English captions. Minor discrepancies may occur, with the German version being the authoritative reference. 

This course offers a comprehensive introduction to the world of penetration testing with Metasploit. You will learn the most important concepts, tools, and techniques for analyzing networks and systems for security gaps and identifying vulnerabilities. The aim of the course is to understand and apply basic penetration testing skills. 

NOTE: 

To access your e-learning course with us, you need a Golem Career World customer account. To create one, simply use the same email address that you want to use to access the course. Your customer account is free of charge, of course. 

What you will learn: 

  • Introduction to Metasploit and its possible applications 
  • Use of the Metasploit console and its modules 
  • Use of Meterpreter for advanced penetration testing 
  • Gathering information and scanning networks for vulnerabilities 
  • Carrying out attacks and simulating exploits 
  • Methods for client-side exploitation 
  • Managing and using systems after successful exploitation 

Requirements: 

  • Good administrative experience with Linux and Windows 
  • Experience with the Linux shell 
  • Basic knowledge of system administration, network technology, and programming 
  • Familiarity with working in a virtual test environment 
  • Enthusiasm for learning and experimenting 

Who is this course suitable for? 

  • IT security specialists who want to take their first steps in penetration testing 
  • System administrators who want to deepen their knowledge of security assessment 
  • Tech enthusiasts with an interest in vulnerability analysis and network security 
     
    After your purchase: 

a.) Log in to your Golem Career World account and click on your order. Then click on “View online” to start the course. 
b.) You will receive an order confirmation by email. Click on “View order” to go to the checkout page, where you will see the “Go to my courses” button. 
c.) Alternatively, you can click on this link immediately after purchase: “My e-learning courses.” 
d.) If you have purchased multiple accesses, please inform the authorized persons that they need a free Golem Career World account. They will automatically receive an invitation to activate their account. 
 
Course details: 

This course provides you with practical knowledge of the basics of penetration testing with Metasploit. You will learn how to use Metasploit effectively, simulate attacks, and evaluate network security. The course covers all essential aspects from vulnerability scanning and exploits to post-exploitation. 

Course content - 9 sections • 48 lessons • 4 hours 32 minutes total duration

1. Introduction and information about the course
1.1 Trailer
1.2 Information about the course
1.3 My test environment

2. Introduction to Metasploit
2.1 Metasploit editions
2.2 Definitions of terms
2.3 Scope and frequency
2.4 Types of pentests
2.5 Pentest phases
2.6 The differences
2.7 Vulnerabilities and exploits

3. Exploring Metasploit
3.1 Initializing the database and starting the console
3.2 Understanding and exploring the Metasploit console
3.3 The pentest-standard.org website
3.4 Workspace
3.5 Main payload types
3.6 Payload types in Metasploit
3.7 Creating and executing payloads
3.8 Creating a payload with Metasploit
3.9 Metasploit encoders

4. Using Meterpreter
4.1 Creating a Meterpreter 
4.2 Meterpreter session and the help
4.3 Plaintext communication reverse 
4.4 Encrypted communication with Meterpreter reverse 
4.5 The Incognito extension
4.6 Virus Total

5. Gathering information and scanning
5.1 Gathering information
5.2 Searching for modules
5.3 A Syn PortScan
5.4 A TCP PortScan and nmap
5.5 Using host information
5.6 Using other auxiliary modules
5.7 Importing an existing vulnerability scan report
5.8 Searching for exploits

6. Carrying out attacks
6.1 Exploiting a Metasploitable vulnerability
6.2 Exploit and payloads
6.3 Launching an attack

7. Client-side exploitation
7.1 MSFVenom Payload Creator
7.2 Executing the created payload
7.3 Creating a payload with the Social Engineering Toolkit
7.4 Creating a new reverse Meterpreter shell
7.5 Concealing the payload

8. Managing post-exploitation
8.1 Using post modules
8.2 Enabling RDP and creating a hash dump
8.3 Lateral movement – exploring new systems
8.4 Port forwarding and RDP session
8.5 Post enumeration

9. In conclusion
9.1 GitHub
9.2 Summary

Dozent

Tom Wechsler

Tom Wechsler; Microsoft Azure MVP / Cyber Security Analyst / Trainer

Ich arbeite seit dem Jahr 2000 in der Informatik und bin seit 2007 selbstständiger Cloud (Azure) Solution Architect / Cyber Security Analyst und Trainer. Das Wissen aus meinen stetigen Weiterbildungen in der Informatik (EC-Council Certified Ethical Hacker und Network Security Administrator, CompTIA Network+/Security+/Linux+/Server+/Cloud+/PenTest+/CySA+, Microsoft MCSE, MCSA, MCS, MCTS, Cisco CCNA R&S, Security und Cyber Ops, Linux Professional Institute LPIC-1, LPIC-2 und LPIC-3: Security, Virtualization and High Availability und Mixed Environment, SUSE Certified Linux Administrator und Red Hat Certified System Administrator - RHCSA) gebe ich gerne weiter, wobei mir auch die Ausbildung zum MCT (Microsoft Certified Trainer) hilft



Tom Wechsler; Microsoft Azure MVP / Cyber Security Analyst / Trainer

I have been working in the field of IT since 2000 and have been a self-employed Cloud (Azure) Solution Architect, Cyber Security Analyst, and Trainer since 2007.
I continuously expand my knowledge in IT through ongoing education (EC-Council Certified Ethical Hacker and Network Security Administrator, CompTIA Network+/Security+/Linux+/Server+/Cloud+/PenTest+/CySA+, Microsoft MCSE, MCSA, MCS, MCTS, Cisco CCNA R&S, Security and Cyber Ops, Linux Professional Institute LPIC-1, LPIC-2 and LPIC-3: Security, Virtualization and High Availability and Mixed Environment, SUSE Certified Linux Administrator and Red Hat Certified System Administrator - RHCSA), which I am happy to share. My training as a Microsoft Certified Trainer (MCT) also supports me in this.

Weitere Trainings des Dozenten:

Auf einen Blick

Was lerne ich in diesem Kurs?

  • Introduction to Metasploit and its possible applications
  • Use of the Metasploit console and its modules
  • Use of Meterpreter for advanced penetration testing
  • Gathering information and scanning networks for vulnerabilities
  • Carrying out attacks and simulating exploits
  • Methods for client-side exploitation
  • Managing and using systems after successful exploitation

Worum geht es in dem "Exclusive: Penetration Testing with Metasploit (E-Learning in English)"?

Bei "Exclusive: Penetration Testing with Metasploit (E-Learning in English)" geht es um Use of the Metasploit console and its modules und Use of Meterpreter for advanced penetration testing.

Um welche Art von Training handelt es sich?

Dies ist ein E-Learning Training, das Sie in Ihrem eigenen Tempo online absolvieren können.

Wie lange dauert dieser Kurs?

Die Kursdauer beträgt 4 Stunden 32 Minuten und umfasst 48 Lektionen mit 9 Sektionen.

Wer ist der Dozent?

Tom Wechsler

Tom Wechsler; Microsoft Azure MVP / Cyber Security Analyst / Trainer

Ich arbeite seit dem Jahr 2000 in der Informatik und bin seit 2007 selbstständiger Cloud (Azure) Solution Architect / Cyber Security Analyst und Trainer. Das Wissen aus meinen stetigen Weiterbildungen in der Informatik (EC-Council Certified Ethical Hacker und Network Security Administrator, CompTIA Network+/Security+/Linux+/Server+/Cloud+/PenTest+/CySA+, Microsoft MCSE, MCSA, MCS, MCTS, Cisco CCNA R&S, Security und Cyber Ops, Linux Professional Institute LPIC-1, LPIC-2 und LPIC-3: Security, Virtualization and High Availability und Mixed Environment, SUSE Certified Linux Administrator und Red Hat Certified System Administrator - RHCSA) gebe ich gerne weiter, wobei mir auch die Ausbildung zum MCT (Microsoft Certified Trainer) hilft



Tom Wechsler; Microsoft Azure MVP / Cyber Security Analyst / Trainer

I have been working in the field of IT since 2000 and have been a self-employed Cloud (Azure) Solution Architect, Cyber Security Analyst, and Trainer since 2007.
I continuously expand my knowledge in IT through ongoing education (EC-Council Certified Ethical Hacker and Network Security Administrator, CompTIA Network+/Security+/Linux+/Server+/Cloud+/PenTest+/CySA+, Microsoft MCSE, MCSA, MCS, MCTS, Cisco CCNA R&S, Security and Cyber Ops, Linux Professional Institute LPIC-1, LPIC-2 and LPIC-3: Security, Virtualization and High Availability and Mixed Environment, SUSE Certified Linux Administrator and Red Hat Certified System Administrator - RHCSA), which I am happy to share. My training as a Microsoft Certified Trainer (MCT) also supports me in this.

Wie viel kostet es?

Derzeit 40,00 EUR (regulärer Preis 80,00 EUR).

Wie viele Lektionen sind inbegriffen?

Dieser Kurs umfasst 48 lessons, die alle wesentlichen Themen abdecken.

Gruppenbuchungen


Deine Frage an uns

Customer Reviews

Be the first to write a review
0%
(0)
0%
(0)
0%
(0)
0%
(0)
0%
(0)


DU SPARST -50% 47,60 EUR inkl. MwSt./USt
40,00 EUR zzgl. MwSt./USt. 80,00 EUR