- Getting started with Metasploit Framework
- Setting up PostgreSQL
- Creating Workspaces
- Integrating Nmap with Metasploit Framework
- Optional: Nmap Recap
What you'll learn
- Understand architecture, scanning flow and components of Nmap Scanner.
- Learn to launch basics to advance Scans with Nmap Scanner
- Learn to Integrate Nmap with Metasploit Framework
- Practically understand the working, components and commands in Metasploit Framework
Description
Learn to conduct vulnerability assessment with Nmap and penetration testing Metasploit framework.
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
The Metasploit Project was undertaken in 2003 by H.D. Moore for use as a Perl-based portable network tool, with assistance from core developer Matt Miller. It was fully converted to Ruby by 2007, and the license was acquired by Rapid7 in 2009, where it remains as part of the Boston-based company’s repertoire of IDS signature development and targeted remote exploit, fuzzing, anti-forensic, and evasion tools.
Other Courses
A Rookie's Guide to Raspberry Pi
A short, free overview of your Raspberry Pi, and how to get started.
Introduction to Photoshop CC: Tutorials for Beginners
Create awesome images, book covers, and video thumbnails by learning techniques in this Photoshop CC beginner's course
Speed through Excel with Autofill
Unlock the secrets of Excel's Autofill features to save you time and effort
Automating SAP Operation with UiPath StudioX
SAP Operations could be Automated by use of Robotic Process Automation - a free tool UiPath StudioX Community edition.
Project Management for Life Skills
Five Simple Steps for More Successful Life Projects
World Class Data-Driven Risk Analysis - Theory & Application
Analyze and present risk with scientific rigor and improve stakeholder engagement. Build your skills, train your staff.
About the instructors
- 4.14 Calificación
- 85468 Estudiantes
- 5 Cursos
Rajneesh Gupta
Blockchain and Cybersecurity Specialist | Author
9 assertive years in information security have led me to do one thing: Build InfoSec solutions that actually work.
He has worked with Organizations such as HP Enterprise, Alcatel-Lucent, Reliance Communications.
He is currently working as Principal Consultant at Tesseract Global and helps businesses make security possible by enabling visibility, engagement, and leadership.
Diverse security leadership experience, including roles in operations, system integration, security architecture, project management, Identity, and Access management, business continuity planning, IT risk management and information security.
He has delivered multiple assignments on Cyber Security, Payments, PCI DSS, SSAE16, ISO20000, BS25999, ISO 27001, Secure Architecture Design & Solution Implementation, IT Security & Risk Management, IT Audit, Advisory & Assurance and Business Process & Controls Improvement for enterprises in United States, Singapore, India, UAE & UK.
Student feedback
Course Rating
Reviews
clear but not crystal clear
good intro
Awesome
yes but it would be better if there is a step by step approach