Exploit Development and Execution with the Metasploit Framework

As a security professional learning the ins and outs of exploitation can be challenging. In this course, you'll develop an understanding of how to utilize Metasploit and the assembly language to exploit software applications.
Course info
Rating
(11)
Level
Intermediate
Updated
May 9, 2017
Duration
2h 57m
Table of contents
Description
Course info
Rating
(11)
Level
Intermediate
Updated
May 9, 2017
Duration
2h 57m
Description

As a security professional learning the ins and outs of exploitation can be challenging. In this course, Exploit Development and Execution with the Metasploit Framework, you'll develop an understading of assembly language so you can use it to exploit software applications. First, you'll learn the basics of efficiently using assembly language in practice. Next, you'll be introduced and explore reverse engineering. Finally, you'll discover how to utilize the Metasploit Framework for exploitation. By the end of this course, you'll have an understanding of the basics of exploitation, and will have an idea of how this looks in practice.

About the author
About the author

Gus is an IT expert specialized in programming and security. He's a passionate blogger, geek, and loves what he's doing.

More from the author
Transcript
Transcript

Hi everyone, my name is Gus Khawaja and welcome to this exciting course of Exploit Development execution using the Metasploit framework.

This is not any normal course, in fact, this is one of the most difficult subjects that you can encounter in your career as a security professional. I know you want to learn and curious about exploitation, that’s why you’re watching this video right? In this course, we are going to see together how to leverage your knowledge in assembly language so you can use it to exploit software applications.

Some of the major topics that we will cover include:

  1. Basics of Assembly Language
  2. Reverse Engineering
  3. Using the Metasploit Framework for Exploitation
  4. And much much more
By the end of this course, you should grasp the basics of exploitation and will give you an idea of how this looks in practice.

Before beginning this course, you should be familiar with the essentials of programming and ethical hacking, but don’t worry I will walk you through all the details.

I hope you’ll join me on this journey to learn some exciting stuff with Metasploit.