Penetration testing is an exciting way to blend an attacker mindset with the tools needed to identify security problems. This course will teach you the basics of the Metasploit Framework to test and exploit vulnerable systems.
The Metasploit Framework is a very capable exploitation toolkit. It is not an easy tool to quickly understand and utilize effectively. In this course, Metasploit: Getting Started, you’ll learn to use the Metasploit Framework to configure and launch exploits with payloads to compromise vulnerable target systems in a red team and penetration testing context. First, you’ll explore the Metasploit Framework architecture, which is key to understanding the framework’s capabilities and inner workings. Next, you’ll discover how to configure the Metasploit Framework for launching an attack. Finally, you’ll learn how to use the Metasploit Framework’s tools for post-exploitation activities once a system has been compromised. When you’re finished with this course, you’ll have the skills and knowledge of configuring and launching penetration tests needed to effectively use the Metasploit Framework.
Course Overview Hello everyone, my name is Keith Watson, and welcome to my course, Metasploit: Getting Started. I'm an information security professional, and I've been working in the security field since 1997. I've had a lot of roles in that time, from a system administrator with security responsibilities, software development, security architecture, to my current role as a trusted adviser to clients. The Metasploit Framework has been around since 2003 and now has more than 1900 exploits included in the current release. That is significant growth over time, and Metasploit's current capabilities are most impressive. In this course, we're going to explore penetration testing using the Metasploit Framework. Some of the major topics that we will cover include an introduction to penetration testing, the Metasploit Framework architecture, installation and configuration of the Metasploit Framework using Kali Linux, launching some simple attacks, and finally, managing operations and data. By the end of this course, you'll know the basics of Metasploit and will be able to configure and launch attacks. Before beginning this course, you should have some familiarity with Linux and networking concepts. I hope you'll join me on this journey to learn penetration testing with the Metasploit: Getting Started course, here at Pluralsight.