Companies Home Search Profile

Metasploit Essential Training

Focused View

Liam Cleary

4:00:30

93 View
  • 01 - The essentials of Metasploit.mp4
    00:39
  • 02 - What you should know.mp4
    01:03
  • 01 - What is Metasploit.mp4
    05:10
  • 02 - Why use Metasploit.mp4
    05:09
  • 03 - Understanding the Metasploit structure.mp4
    04:03
  • 04 - The Metasploit database.mp4
    03:14
  • 01 - Understand the msfconsole.mp4
    10:46
  • 02 - Understanding payloads and stagers within Metasploit.mp4
    05:34
  • 03 - How to create payloads and stagers.mp4
    11:30
  • 04 - Understanding encoders within Metasploit.mp4
    02:30
  • 01 - What is Meterpreter.mp4
    03:57
  • 02 - How to use Meterpreter.mp4
    07:28
  • 03 - What is msfvenom.mp4
    03:22
  • 04 - How to use msfvenom.mp4
    10:57
  • 05 - Understand how to use the incognito extension.mp4
    04:45
  • 01 - Understand information Gathering and Scanning.mp4
    02:50
  • 02 - Understanding scanners within Metasploit.mp4
    01:48
  • 03 - How to use scanners.mp4
    05:00
  • 04 - Discovering services and exploits.mp4
    04:53
  • 05 - How to discover services.mp4
    07:19
  • 06 - How to discover exploits.mp4
    05:49
  • 01 - Understanding attack terminology.mp4
    05:09
  • 02 - Selecting the type of attack.mp4
    04:20
  • 03 - Configuring an exploit and payload.mp4
    08:38
  • 04 - Launching an attack.mp4
    05:40
  • 01 - Generating client payloads.mp4
    10:21
  • 02 - Creating handlers for reverse shells.mp4
    04:40
  • 03 - Creating and using a reverse shell.mp4
    09:14
  • 04 - Understand how to bypass antivirus.mp4
    02:56
  • 05 - Exploit a windows workstation.mp4
    11:22
  • 06 - Use an office macro attack.mp4
    08:57
  • 07 - Bypass antivirus protection.mp4
    10:53
  • 08 - Bypass antivirus protection (Part 2).mp4
    04:59
  • 01 - Using post-exploitation modules.mp4
    10:44
  • 02 - Understand how to pivot.mp4
    02:37
  • 03 - Using port-forwarding.mp4
    13:39
  • 04 - Using Mimikatz.mp4
    08:51
  • 05 - Using enumeration modules.mp4
    08:37
  • 01 - Next steps.mp4
    01:07
  • Description


    As a security or IT professional, you need to know how to check security within your environment, and one of the most commonly used tools available is Metasploit. It lets you conduct basic security checks, full assessments, and penetration testing so you can avoid becoming the target of an attack. Join instructor Liam Cleary to learn how and why you should add Metasploit to your cybersecurity testing toolkit and explore the skills you need to know to get up and running fast.

    Become more proficient with information gathering, vulnerability scanning, and client-side and post-exploitation using Linux, Windows, and Meterpreter as well as other networking tools such as msfvenom and Mimikatz. By the end of this course, you’ll be equipped with new skills in security and network management to better protect yourself and your organization from potential vulnerabilities.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Liam began his career as a trainer of all things computer-related. He quickly realized that programming, breaking, and hacking were much more fun. He spent the next few years working within core infrastructure and security services. He is the founder and owner of SharePlicity, a consulting company that focuses on Microsoft 365 and Azure technology. His role within SharePlicity is to help organizations implement Microsoft 365 and Azure technology to enhance internal and external collaboration, document and records management, automate business processes, and implement security controls and protection. He is a Microsoft MVP and Microsoft Certified Trainer, focusing on architecture, security, and crossing the boundary into software development. Over the past few years, his specialty has been security in Microsoft 365, Azure, and its surrounding platforms. Liam also creates online training courses for Pluralsight, LinkedIn Learning, and Cloud Academy and teaches multiple Microsoft certification courses for Opsgility and Microsoft. You can find him at user groups and conferences, teaching classes, offering advice, spending time in the community, teaching his kids how to code, raspberry PI programming, hacking the planet, building Lego robots, or coaching soccer.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 39
    • duration 4:00:30
    • Release Date 2023/03/01