Simple play icon Course
Skills

Perform Attacks with Metasploit

by Kevin Cardwell

This course will teach you how to leverage Metasploit, attack targets and gain privileged access using multiple techniques.

What you'll learn

Do you want to work as a penetration tester and to gain more experience in using the more advanced features of Metasploit? In this course, Perform Attacks with Metasploit, you’ll learn to follow a systematic approach and leverage weaknesses at the client side and how to apply methods of post exploitation once access has been gained. First, you’ll explore the process of attacking using implanted executable files for access. Next, you’ll discover how to effectively perform post exploitation with the Meterpreter shell payload. Finally, you’ll learn how to interpret the results from the output of the Metasploit toolkit and create the components of a deliverable report. When you’re finished with this course, you’ll have the skills and knowledge of using attacks against a client and methods to extract the information required for a report by performing post exploitation methods and techniques

About the author

Kevin Cardwell provides consulting services for companies throughout the world and is an adviser to numerous government entities across the globe. He is an instructor, technical editor, and author for computer forensics and hacking courses. He is author of Building Virtual Pentesting Labs for Advanced Penetration Testing, first and second edition.

Ready to upskill? Get started