Chat with us, powered by LiveChat

COURSES

Metasploit Next-Level

If you want to really know how to customize Metasploit to suit your needs then this is the course for you!


COURSE DESCRIPTION 

Metasploit has become the defacto standard for penetration testing today. Most security professionals have some familiarity with it, but few can REALLY get in and drive it like a pro.

SecureNinja’s (3) day workshop takes your Metasploit skills to the next level!  This course that is designed to take a user from little to no experience with Metasploit to using all of the most advanced features of the tool has to offer.

This class is unique in that is starts with an introduction to Ruby scripting (for people with little programming experience), and 2 out of the 3 days are focused on writing your own modules in Metasploit.

Let’s face it – if you want to learn how to use Metasploit you don’t need me – you just need YouTube. If you want to really know how to customize Metasploit to suit your needs then this is the course for you.

WHAT'S INCLUDED

  • (3) Three days of expert Metasploit training by Joe McCray
  • Electronic Courseware
  • Pastebin (Commands file so you can copy/paste the commands)
  • Virtual Machines
  • Videos of the class

WHO WOULD BENEFIT

  • IT System Administrators
  • IT Security Professionals      

COURSE LENGTH  

  • 3 days

DELIVERY FORMAT

  • Choose from Physical Classroom or Live Online

FOLLOW ON COURSES 

  • Cyber War
  • Exploit Development

COURSE DETAILS        

Day 1: Ruby For Metasploit

  • Ruby Fundamentals
  • Metasploit Architecture
  • Auxiliary/Exploit Modules


Day 2: Metasploit Kung Fu

  • Auxiliary Modules
  • Port Scanning
  • Vulnerability Scanning
  • Exploitation
  • Service-Based Exploitation
  • Client-Side Exploitation
  • Post-Exploitation
  • Privilege Escalation (post modules and local exploits)
  • Hashdumping and other methods of credential theft
  • Data-mining a host
  • Pivoting
  • Tunneling


Day 3: Writing your own modules & Writing exploits

  • Writing Auxilliary Modules
  • Writing Post Modules
  • Railgun
  • Writing Exploits for the Metasploit
  • Converting Metasploit Modules to Stand Alone Tools

 

These training courses are only delivered as an onsite format for groups of 5 or more. Our world-class instructors will bring our on-demand turn-key solution directly to you. Contact us now for more details and pricing