Torrent details for "[Packtpub.Com] Hands-On Penetration Testing with Metasploit - [FCO] TGx Exclusive"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
770.79 MB
Info Hash:
4d272aca18557e8063668a077a4d263b083d5d79
Added By:
Added:  
04-11-2018 19:30
Views:
1,651
Health:
Seeds:
0
Leechers:
0
Completed:
50
wide




Description
wide
Image error


By Sunil Gupta
Released Tuesday, October 30, 2018 New Release!
Course Source: https://www.packtpub.com/networking-and-servers/hands-penetration-testing-metasploit-video

Put your defenses to the test with the Metasploit framework

Video Details

ISBN 9781789610512
Course Length 3 hours 36 minutes

Table of Contents

- INTRODUCTION TO THE METASPLOIT FRAMEWORK
- PENTESTING LAB SETUP
- INFORMATION GATHERING WITH METASPLOIT
- VULNERABILITY SCANNING WITH METASPLOIT
- EXPLOITATION WITH METASPLOIT
- POST-EXPLOITATION WITH METASPLOIT
- ADVANCED EXPLOITATION WITH METASPLOIT

Video Description

Metasploit is the best and most widely used tool for penetration testing, providing powerful attack simulations, security assessment management, and more. Metasploit is used by White Hat, and by Black Hat, hackers. Metasploit is a playground for hackers where they demonstrate their skill by protecting or damaging the target. In this course, you'll learn how to use Metasploit to enumerate services, identify potential weaknesses, test vulnerabilities through exploitation, and gather evidence for reporting. First, you'll explore several supporting tools on Kali Linux. Next, you'll explore how exploits and payloads work together to gain access to systems. Finally, you'll learn how Metasploit Framework works. By the end of this course, you'll have a better understanding of how to use Metasploit to quickly assess the security posture of systems and networks to reduce the risk of attack.

Style and Approach

This course is designed to help students understand Metasploit in a structured way, with less confusion. They will understand the use of exploits in different pentesting cases. After completing the course, they will feel confident about using the World's best pentesting framework

What You Will Learn

- Dealing with the use of exploit in Metasploit framework.
- Find and exploit vulnerabilities in networks and web applications effectively
- Perform Vulnerability assessment and Penetration testing with Metasploit
- Working with various kind of Operating Systems
- Perform Privilege Escalation in Machines using advance commands
- Attack on a remote machine using group of exploits
- Get complete access with the effective use of Metasploit commands

Authors

Sunil Gupta

Sunil Gupta. He is a Certified Ethical Hacker. Currently he teaches 50,000+ students online in 150+ countries.

He is a specialist in the Ethical Hacking and Cyber Security areas.

Author strengths –

- Vulnerability assessment
- Penetration testing
- Intrusion detection
- Risk identification
- Data analysis
- Reporting and briefing.

For More Udemy Free Courses >>> http://www.freetutorials.eu
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.freetutorials.us/


Image error

Image error

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes