Udemy

Metasploit: Ethical hacking and Penetration testing on Kali

Enroll Now
  • 265 Students
  • Updated 3/2019
4.4
(21 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
4 Hour(s) 27 Minute(s)
Language
English
Taught by
Visadi Khalikov
Rating
4.4
(21 Ratings)
1 views

Course Overview

Metasploit: Ethical hacking and Penetration testing on Kali

Learn all the steps of Ethical hacking and Penetration testing with Metasploit and become white hat hacker

This course will teach you hacker's mindset. You will see all the steps which must be performed for successful attack using Metasploit on Kali. If you want to know how security mechanisms of Windows and Linux work and you want to know how to bypass them this course is definitly for you.

All the lessons are well structured and contain actual infromation. That means that all techniques represented in the course still work on modern system.

I am going to keep the content updated and also on the regular basis am going to add new lessons and assignments for my students.

Given course is intended was everyone who is interested in Ethical hacking and Cyber security. It will be useful and helpful for beginners and professionals. Beginners will understand hot to orient in learning Information security and it will help them to structure their studying process.


What will you learn?

After completing the course you will get the following skills and knowledge:

· Skills to manage Windows and Linux using console commands

· All the steps of hacking remote system

· Different port and vulnerability scanning methods of network devices

· You will learn how to attack Windows and Linux systems using different methods

· You will understand how to protect your system against different attacks


Course structure:

· Lab preparation. We will install different Windows and Linux systems.

· Metasploit framework introduction. In given section you will understand how to work with Metasploit, how to perform network attacks, how to collect information about your victim.

· Information gathering. Before attacking remote system it is vital to collect as more information as possible about your target. In this section you will get some techniques.

· Scanning. Here we will discuss how to get more information about running services on remote systems and possible vulnerabilities in Operating system and applications.

· Access gaining. In this section I explain different techniques to get access to remote system. All described techniques still work on real system.

· Access maintaining and Post exploitation. Here you will understand how escalate your privileges on the hacked system, how to hack passwords, how to install backdoors for further remote management and many other things

Course Content

  • 12 section(s)
  • 59 lecture(s)
  • Section 1 Lab network preparation
  • Section 2 Basics of Linux and Kali
  • Section 3 Introduction to Metasploit
  • Section 4 Information gathering
  • Section 5 Scanning
  • Section 6 Access Gaining: Server-side attacks
  • Section 7 Access Gaining: Client-side attacks
  • Section 8 Post-exploitation: Interaction with hacked system
  • Section 9 Post-exploitation: Privilege Escalation
  • Section 10 Post-exploitation: Installation of persistent backdoor
  • Section 11 Post-exploitation: Password Cracking
  • Section 12 Visualization of attacks in Armitage

What You’ll Learn

  • You will learn Metasploit framework, You will understand all the steps to perform any hacking attack, You will get some skills to work with Linux, You will dive into anatomy of different attacks and understand how to perform them on real systems, You will get some skills of WIndows administration, You will see how to collect information about your target, You will see how different scanning techniques work, You will understand how to protect your system


Reviews

  • P
    Peter A. Angritt
    2.5

    This course is obviously out of date. The lab setup instructions were incomplete at best, and much of the practice is based on old versions of software and scripts. The instructions fail frequently. I spent more time resolving installation errors than doing practice lessons.

  • J
    Jacob M Beasley
    5.0

    Solid course. Very clean.

  • J
    Jeya Kumar
    5.0

    It was a nice experience and I gain my knowledge

  • C
    Christopher Bianchi
    5.0

    absolutely stunning course ** 100% quality

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed