Level: Advanced

Metasploit Pro

5 Day | Instructor Led

Metasploit Pro is the full-featured edition of Metasploit, the world's leading penetration testing solution, and is designed for enterprise security programs and advanced penetration tests. Metasploit allows you to test your defenses by safely simulating attacks on your network to uncover security issues. Metasploit can also be used to validate vulnerabilities as part of your vulnerability management program.

Inquire About
Metasploit Pro

Ideal Candidates for Metasploit Pro Class

Cybersecurity experts that need to add Metasploit Pro to their knowledge base

Metasploit Pro Prerequisites

Basic cybersecurity knowledge and digital forensics

What You'll Get in Metasploit Pro

What You'll Learn in Metasploit Pro

Metasploit Pro – Product overview and key feature descriptions

Navigating the GUI – The web interface (GUI) is introduced and demonstrated for administration tasks and working with projects for penetration testing

Network Scanning – Covers active scanning, network/device enumeration, and importing vulnerability scan data from other products

Exploitation Techniques - Various techniques for gaining access to hosts using targeted exploits, automated exploitation, and brute-force attacks

Maintaining Access and Privilege Escalation – Alternative access techniques and privilege escalation methods, including client-side exploits, local system access, and persistence

Web Application Testing – Use Metasploit’s web application vulnerability scanning and exploitation capabilities.

Social Engineering – Techniques for utilizing Metasploit Pro to simulate drive-by attacks and spear phishing in order to identify user awareness training gaps.

Quick Start Wizards and MetaModules – Experience the ease and functionality of the built-in wizards (for quick penetration tests, web app testing, and campaigns) and the new MetaModules which simplify testing by automating common, complicated security tests

Reporting – Standard and custom reporting

Metasploit Pro Certification

None

Metasploit Pro Outline

Metasploit Pro – Product overview and key feature descriptions

Navigating the GUI – The web interface (GUI) is introduced and demonstrated for administration tasks and working with projects for penetration testing

Network Scanning – Covers active scanning, network/device enumeration, and importing vulnerability scan data from other products

Exploitation Techniques - Various techniques for gaining access to hosts using targeted exploits, automated exploitation, and brute-force attacks

Maintaining Access and Privilege Escalation – Alternative access techniques and privilege escalation methods, including client-side exploits, local system access, and persistence

Web Application Testing – Use Metasploit’s web application vulnerability scanning and exploitation capabilities.

Social Engineering – Techniques for utilizing Metasploit Pro to simulate drive-by attacks and spear phishing in order to identify user awareness training gaps.

Quick Start Wizards and MetaModules – Experience the ease and functionality of the built-in wizards (for quick penetration tests, web app testing, and campaigns) and the new MetaModules which simplify testing by automating common, complicated security tests

Reporting – Standard and custom reporting

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

Advanced Cyber Range Environment (ACRE) - Ransomware Exercise

The Ransomware exercise is a customized, six-hour, live fire Cyber Range training exercise hosted on ACRE. This exercise is led by expert cyber security engineers and can be executed in a classroom as well as remotely. In this exercise, a ransomware-based attack (i.e., “WannaKry”) is launched via a malicious spear phishing originated compromise. This exercise includes a hands-on keyboard interface, which creates realistic technical training and management interaction opportunities. This exercise is not simulated – it is real malware, detonated in representative network enviroment. Participants are encouraged to view the attack as if it were happening to their institutions in real time, and asked to share what they have done or would do based on the facts provided. Such “range-based” exercises help institutions better understand the impact of an attack and prompt them to improve the ways in which their network defenders respond, communicate, request assistance, and recover from real-world cyber attacks. Institutions that have participated in this exercise have benefited directly by building greater interaction with their security community, as well as increasing capability maturity levels and resiliency across their specific customer sector.


CompTIA Cybersecurity Analyst (CSA+)

CompTIA's Cybersecurity Analyst (CSA+) training from UKI teaches students to apply behavioral analytics to improve the overall state of IT security, providing critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.


CompTIA Advanced Security Practitioner (CASP) CAS 003

The CASP certification is a vendor-neutral, intensive exam that validates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications and business disciplines. This exam preparation course provides in-depth review of the four domains included in the exam. Demonstrations and practice exams reinforce the concepts and provide the framework for a personalized study plan for exam success.


© 2018 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W