Disclaimer: This e-learning course was fully translated with AI support. Subtitles are based on the original German version (see here). The video modules display the German user interface, but the spoken language is English, including English captions. Minor discrepancies may occur, with the German version being the authoritative reference.
This course offers a comprehensive introduction to the world of penetration testing with Metasploit. You will learn the most important concepts, tools, and techniques for analyzing networks and systems for security gaps and identifying vulnerabilities. The aim of the course is to understand and apply basic penetration testing skills.
NOTE:
To access your e-learning course with us, you need a Golem Career World customer account. To create one, simply use the same email address that you want to use to access the course. Your customer account is free of charge, of course.
What you will learn:
- Introduction to Metasploit and its possible applications
- Use of the Metasploit console and its modules
- Use of Meterpreter for advanced penetration testing
- Gathering information and scanning networks for vulnerabilities
- Carrying out attacks and simulating exploits
- Methods for client-side exploitation
- Managing and using systems after successful exploitation
Requirements:
- Good administrative experience with Linux and Windows
- Experience with the Linux shell
- Basic knowledge of system administration, network technology, and programming
- Familiarity with working in a virtual test environment
- Enthusiasm for learning and experimenting
Who is this course suitable for?
- IT security specialists who want to take their first steps in penetration testing
- System administrators who want to deepen their knowledge of security assessment
- Tech enthusiasts with an interest in vulnerability analysis and network security
After your purchase:
a.) Log in to your Golem Career World account and click on your order. Then click on “View online” to start the course.
b.) You will receive an order confirmation by email. Click on “View order” to go to the checkout page, where you will see the “Go to my courses” button.
c.) Alternatively, you can click on this link immediately after purchase: “My e-learning courses.”
d.) If you have purchased multiple accesses, please inform the authorized persons that they need a free Golem Career World account. They will automatically receive an invitation to activate their account.
Course details:
This course provides you with practical knowledge of the basics of penetration testing with Metasploit. You will learn how to use Metasploit effectively, simulate attacks, and evaluate network security. The course covers all essential aspects from vulnerability scanning and exploits to post-exploitation.
Course content - 9 sections • 48 lessons • 4 hours 32 minutes total duration
1. Introduction and information about the course
1.1 Trailer
1.2 Information about the course
1.3 My test environment
2. Introduction to Metasploit
2.1 Metasploit editions
2.2 Definitions of terms
2.3 Scope and frequency
2.4 Types of pentests
2.5 Pentest phases
2.6 The differences
2.7 Vulnerabilities and exploits
3. Exploring Metasploit
3.1 Initializing the database and starting the console
3.2 Understanding and exploring the Metasploit console
3.3 The pentest-standard.org website
3.4 Workspace
3.5 Main payload types
3.6 Payload types in Metasploit
3.7 Creating and executing payloads
3.8 Creating a payload with Metasploit
3.9 Metasploit encoders
4. Using Meterpreter
4.1 Creating a Meterpreter
4.2 Meterpreter session and the help
4.3 Plaintext communication reverse
4.4 Encrypted communication with Meterpreter reverse
4.5 The Incognito extension
4.6 Virus Total
5. Gathering information and scanning
5.1 Gathering information
5.2 Searching for modules
5.3 A Syn PortScan
5.4 A TCP PortScan and nmap
5.5 Using host information
5.6 Using other auxiliary modules
5.7 Importing an existing vulnerability scan report
5.8 Searching for exploits
6. Carrying out attacks
6.1 Exploiting a Metasploitable vulnerability
6.2 Exploit and payloads
6.3 Launching an attack
7. Client-side exploitation
7.1 MSFVenom Payload Creator
7.2 Executing the created payload
7.3 Creating a payload with the Social Engineering Toolkit
7.4 Creating a new reverse Meterpreter shell
7.5 Concealing the payload
8. Managing post-exploitation
8.1 Using post modules
8.2 Enabling RDP and creating a hash dump
8.3 Lateral movement – exploring new systems
8.4 Port forwarding and RDP session
8.5 Post enumeration
9. In conclusion
9.1 GitHub
9.2 Summary

