Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Exploitation and Post-exploitation with Metasploit

This course teaches you how to exploit and maintain access to vulnerable systems using Metasploit. You'll gain practical skills in exploiting known vulnerabilities and conducting post-exploitation with Meterpreter.

Intermediate
31m
(5)

Created by Dale Meredith

Last Updated Oct 09, 2024

Course Thumbnail
  • Course

Exploitation and Post-exploitation with Metasploit

This course teaches you how to exploit and maintain access to vulnerable systems using Metasploit. You'll gain practical skills in exploiting known vulnerabilities and conducting post-exploitation with Meterpreter.

Intermediate
31m
(5)

Created by Dale Meredith

Last Updated Oct 09, 2024

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

In today's crazy world of threats, understanding how to exploit and leverage vulnerabilities is crucial for effective penetration testing. In this course, Exploitation and Post-exploitation with Metasploit, you'll learn how to exploit known vulnerabilities using the Metasploit Framework and perform advanced post-exploitation tasks. First, you'll explore how to use Metasploit’s vulnerability database to identify and exploit weaknesses in target systems. Next, you’ll discover how to maintain access and control over compromised systems using Meterpreter, including privilege escalation and lateral movement. Finally, you'll learn how to exfiltrate sensitive data while maintaining stealth and persistence on the target. By the end of this course, you'll have the practical skills and knowledge needed to carry out advanced exploitation and post-exploitation techniques using Metasploit.

Exploitation and Post-exploitation with Metasploit
Intermediate
31m
(5)
Table of contents

About the author
Dale Meredith  - Pluralsight course - Exploitation and Post-exploitation with Metasploit
Dale Meredith
74 courses 4.5 author rating 5692 ratings

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.

Get started with Pluralsight