Skip to main content

Home Specialist skills Security SEC580: Metasploit for Enterprise Penetration Testing

SEC580: Metasploit for Enterprise Penetration Testing

  • bullet point
    Learn how to apply the incredible capabilities of the Metasploit Framework in a comprehensive penetration testing and vulnerability assessment regimen
  • bullet point
    Learn how Metasploit can fit into your day to day penetration testing assessment activities
  • bullet point
    Gain an in-depth understanding of the Metasploit Framework far beyond how to exploit a remote system
  • bullet point
    Explore exploitation, post-exploitation reconnaissance, token manipulation, spear-phishing attacks, and the rich feature set of the Meterpreter, a customised shell environment specially created for exploiting and analysing security flaws

Overview

Off the shelf (OTS)

Many enterprises today face regulatory or compliance requirements that mandate regular penetration testing and vulnerability assessments. Commercial tools and services for performing such tests can be expensive. While really solid free tools such as Metasploit are available, many testers do not understand the comprehensive feature sets of these tools and nor how to apply them in a professional-grade testing methodology. Metasploit was designed to help testers confirm vulnerabilities using an open-source and easy-to-use framework. This course will help students get the most out of this free tool.

SEC580 will show students how to apply the incredible capabilities of the Metasploit Framework in a comprehensive penetration testing and vulnerability assessment regimen, and according to a thorough methodology for performing effective tests. Students who complete the course will have a firm understanding of how Metasploit can fit into their penetration testing and day to day assessment activities. The course will provide an in-depth understanding of the Metasploit Framework far beyond simply showing attendees how to exploit a remote system. The class will cover exploitation, post-exploitation reconnaissance, anti-virus evasion, spear-phishing attacks, and the rich feature set of the Meterpreter, a customised shell environment specially created to exploit and analyse security flaws.

The course will also cover many of the pitfalls that a tester may encounter when using the Metasploit Framework and how to avoid or work around them, making tests more efficient and safer.

Delivery method
Virtual icon

Virtual

Course duration
Duration icon

14 hours

Competency level
Working icon

Working

Pink building representing strand 4 of the campus map
Delivery method
  • Virtual icon

    Virtual

Course duration
Duration icon

14 hours

Competency level
  • Working icon

    Working