Introduction to Metasploit
  • Welcome to the course
  • Metasploit - what's that?
  • What you need during the training
  • Deep introduction to Metasploit framework
Metasploit in practice
  • Working with Metasploit modules
  • Conducting penetration tests
Conducting attacks and testing vulnerabilities
  • Attack vectors that work
  • Database-oriented attacks
Metasploit for professionals
  • Taking control over working machines
NOTES
  • Download notes
Rootkits and Stealth Apps: Creating and Revealing v2.0 course
  • Writing a shellcode
BONUS section - get your coupon code here
  • BONUS LECTURE: Learn more and get to know our other courses
  • Thank you