Penetration Testing With the Metasploit Framework Video Training
Duration: 3h 22m | Video: h264, yuv420p, 1280x720 30fps | Audio: aac, 44100 Hz, 2 ch | 990 MB
Genre: eLearning | Language: English | Project Files

An essential requirement for protecting any organization's computer and network systems from adversarial attack is finding the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity expert Ric Messier shows you how to use Metasploit, the open source, multi-platform (Linux, Windows, Mac OS) exploit framework deployed by systems administrators and security engineers everywhere to spot those vulnerabilities.

You'll learn how to download, install, and configure the software; how to extend Metasploit; how to perform system reconnaissance and vulnerability identification missions; how to use exploits; and the basics of social engineering attacks, such as phishing and site cloning.

Learn to perform basic network and system security scans using Metasploit
Understand Metasploit's command line, graphical, and web interfaces
Survey reconnaissance techniques like Nmap scanning, SYN scanning, and service scanning
Explore vulnerability identification practices like SMB and VNC open service scanning
Learn to use the exploits in Metasploit to attack systems and identify system vulnerability
See how to develop custom security functions using Ruby scripts
Explore phishing attacks, site cloning, and more

rapidgator_net: or or