[FreeCoursesOnline.Me] [Packtpub.Com] Hands-On Penetration Testing With Metasploit - [FCO]

Torrent Details


[FreeCoursesOnline.Me] [Packtpub.Com] Hands-On Penetration Testing with Metasploit - [FCO]

NAME
[FreeCoursesOnline.Me] [Packtpub.Com] Hands-On Penetration Testing with Metasploit - [FCO].torrent
CATEGORY
Other
INFOHASH
4d272aca18557e8063668a077a4d263b083d5d79
SIZE
771 MB in 31 files
ADDED
Uploaded on 04-11-2018 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description





By Sunil Gupta

Released Tuesday, October 30, 2018 New Release!

Course Source: https://www.packtpub.com/networking-and-servers/hands-penetration-testing-metasploit-video



Put your defenses to the test with the Metasploit framework



Video Details



ISBN 9781789610512

Course Length 3 hours 36 minutes



Table of Contents



- INTRODUCTION TO THE METASPLOIT FRAMEWORK

- PENTESTING LAB SETUP

- INFORMATION GATHERING WITH METASPLOIT

- VULNERABILITY SCANNING WITH METASPLOIT

- EXPLOITATION WITH METASPLOIT

- POST-EXPLOITATION WITH METASPLOIT

- ADVANCED EXPLOITATION WITH METASPLOIT



Video Description



Metasploit is the best and most widely used tool for penetration testing, providing powerful attack simulations, security assessment management, and more. Metasploit is used by White Hat, and by Black Hat, hackers. Metasploit is a playground for hackers where they demonstrate their skill by protecting or damaging the target. In this course, you'll learn how to use Metasploit to enumerate services, identify potential weaknesses, test vulnerabilities through exploitation, and gather evidence for reporting. First, you'll explore several supporting tools on Kali Linux. Next, you'll explore how exploits and payloads work together to gain access to systems. Finally, you'll learn how Metasploit Framework works. By the end of this course, you'll have a better understanding of how to use Metasploit to quickly assess the security posture of systems and networks to reduce the risk of attack.



Style and Approach



This course is designed to help students understand Metasploit in a structured way, with less confusion. They will understand the use of exploits in different pentesting cases. After completing the course, they will feel confident about using the World's best pentesting framework



What You Will Learn



- Dealing with the use of exploit in Metasploit framework.

- Find and exploit vulnerabilities in networks and web applications effectively

- Perform Vulnerability assessment and Penetration testing with Metasploit

- Working with various kind of Operating Systems

- Perform Privilege Escalation in Machines using advance commands

- Attack on a remote machine using group of exploits

- Get complete access with the effective use of Metasploit commands



Authors



Sunil Gupta



Sunil Gupta. He is a Certified Ethical Hacker. Currently he teaches 50,000+ students online in 150+ countries.



He is a specialist in the Ethical Hacking and Cyber Security areas.



Author strengths –



- Vulnerability assessment

- Penetration testing

- Intrusion detection

- Risk identification

- Data analysis

- Reporting and briefing.



For More Udemy Free Courses >>> http://www.freetutorials.eu

For more Lynda and other Courses >>> https://www.freecoursesonline.me/

Our Forum for discussion >>> https://discuss.freetutorials.us/







Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
1 - Introduction to the Metasploit Framework/Exploit and Auxiliary.mp428.9 MB
1 - Introduction to the Metasploit Framework/Metasploit Framework Overview.mp416.1 MB
1 - Introduction to the Metasploit Framework/MSFconsole, MSFcli, and MSFencode.mp424.8 MB
1 - Introduction to the Metasploit Framework/The Course Overview.mp43.7 MB
2 - Pentesting Lab Setup/Installation of Kali Linux.mp425.8 MB
2 - Pentesting Lab Setup/Installation of Virtual Machine.mp430.3 MB
2 - Pentesting Lab Setup/Installation of Windows10.mp438.1 MB
3 - Information Gathering with Metasploit/Information Gathering.mp435.4 MB
3 - Information Gathering with Metasploit/Metasploit Port Scanners.mp431.6 MB
3 - Information Gathering with Metasploit/Port Scanning Techniques.mp413.8 MB
3 - Information Gathering with Metasploit/Port Scanning with Nmap.mp427.3 MB
4 - Vulnerability Scanning with Metasploit/Nessus Installation.mp433.9 MB
4 - Vulnerability Scanning with Metasploit/Scanning a Website for Vulnerabilities.mp443.6 MB
4 - Vulnerability Scanning with Metasploit/Using Nessus by Writing Metasploit.mp448.7 MB
4 - Vulnerability Scanning with Metasploit/Vulnerability Scanning.mp45.6 MB
5 - Exploitation with Metasploit/Exploitation Overview.mp47 MB
5 - Exploitation with Metasploit/Network Exploitation.mp439.1 MB
5 - Exploitation with Metasploit/Website Exploitation.mp443.5 MB
5 - Exploitation with Metasploit/Windows Exploitation.mp434.8 MB
6 - Post-Exploitation with Metasploit/Bypassing UAC.mp432.7 MB
6 - Post-Exploitation with Metasploit/Meterpreter Scripts.mp427.9 MB
6 - Post-Exploitation with Metasploit/Meterpreter.mp437.3 MB
6 - Post-Exploitation with Metasploit/Post-Exploitation – Overview.mp46.8 MB
7 - Advanced Exploitation with Metasploit/Client-Side Attack – Overview.mp450.4 MB
7 - Advanced Exploitation with Metasploit/MSFencode Attack.mp437.2 MB
7 - Advanced Exploitation with Metasploit/Social Engineering Toolkit.mp439.8 MB
7 - Advanced Exploitation with Metasploit/Social Engineering.mp46.4 MB
Discuss.FreeTutorials.Us.html165.7 KB
FreeCoursesOnline.Me.html108.3 KB
FreeTutorials.Eu.html102.2 KB
Presented By SaM.txt33 B

Alternative Torrents for 'FreeCoursesOnline.Me Packtpub.Com Hands Penetration Testing with Metasploit FCO'.

There are no alternative torrents found.