Warning! Do NOT Download Without a VPN!
Your IP Address is . Location is Planet Earth
Your Internet Provider and Government can track your download activities! Hide your IP ADDRESS with a VPN!
We strongly recommend using a VPN service to anonymize your torrent downloads. It's FREE!
START YOUR FREE TRIAL NOW!
|
[FreeCoursesOnline.Me] [Packtpub.Com] Hands-On Penetration Testing With Metasploit - [FCO] |
---|
Torrent Details |
---|
![[FreeCoursesOnline.Me] [Packtpub.Com] Hands-On Penetration Testing with Metasploit - [FCO]](https://l.t0r.site/cover/7710912.jpg)
- NAME
- [FreeCoursesOnline.Me] [Packtpub.Com] Hands-On Penetration Testing with Metasploit - [FCO].torrent
- CATEGORY
- Other
- INFOHASH
- 4d272aca18557e8063668a077a4d263b083d5d79
- SIZE
- 771 MB in 31 files
- ADDED
- Uploaded on 04-11-2018 by our crawler pet called "Spidey".
- SWARM
- 0 seeders & 0 peers
- RATING
- No votes yet.
Please login to vote for this torrent.
Description |
---|
By Sunil Gupta
Released Tuesday, October 30, 2018 New Release!
Course Source: https://www.packtpub.com/networking-and-servers/hands-penetration-testing-metasploit-video
Put your defenses to the test with the Metasploit framework
Video Details
ISBN 9781789610512
Course Length 3 hours 36 minutes
Table of Contents
- INTRODUCTION TO THE METASPLOIT FRAMEWORK
- PENTESTING LAB SETUP
- INFORMATION GATHERING WITH METASPLOIT
- VULNERABILITY SCANNING WITH METASPLOIT
- EXPLOITATION WITH METASPLOIT
- POST-EXPLOITATION WITH METASPLOIT
- ADVANCED EXPLOITATION WITH METASPLOIT
Video Description
Metasploit is the best and most widely used tool for penetration testing, providing powerful attack simulations, security assessment management, and more. Metasploit is used by White Hat, and by Black Hat, hackers. Metasploit is a playground for hackers where they demonstrate their skill by protecting or damaging the target. In this course, you'll learn how to use Metasploit to enumerate services, identify potential weaknesses, test vulnerabilities through exploitation, and gather evidence for reporting. First, you'll explore several supporting tools on Kali Linux. Next, you'll explore how exploits and payloads work together to gain access to systems. Finally, you'll learn how Metasploit Framework works. By the end of this course, you'll have a better understanding of how to use Metasploit to quickly assess the security posture of systems and networks to reduce the risk of attack.
Style and Approach
This course is designed to help students understand Metasploit in a structured way, with less confusion. They will understand the use of exploits in different pentesting cases. After completing the course, they will feel confident about using the World's best pentesting framework
What You Will Learn
- Dealing with the use of exploit in Metasploit framework.
- Find and exploit vulnerabilities in networks and web applications effectively
- Perform Vulnerability assessment and Penetration testing with Metasploit
- Working with various kind of Operating Systems
- Perform Privilege Escalation in Machines using advance commands
- Attack on a remote machine using group of exploits
- Get complete access with the effective use of Metasploit commands
Authors
Sunil Gupta
Sunil Gupta. He is a Certified Ethical Hacker. Currently he teaches 50,000+ students online in 150+ countries.
He is a specialist in the Ethical Hacking and Cyber Security areas.
Author strengths –
- Vulnerability assessment
- Penetration testing
- Intrusion detection
- Risk identification
- Data analysis
- Reporting and briefing.
For More Udemy Free Courses >>> http://www.freetutorials.eu
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.freetutorials.us/
Discussion |
---|
Comments 0
There are no comments yet.
Post Your Comment
To post your comment to this torrent, please login to our site.
Files in this torrent |
---|
FILENAME | SIZE | |
---|---|---|
![]() | 1 - Introduction to the Metasploit Framework/Exploit and Auxiliary.mp4 | 28.9 MB |
![]() | 1 - Introduction to the Metasploit Framework/Metasploit Framework Overview.mp4 | 16.1 MB |
![]() | 1 - Introduction to the Metasploit Framework/MSFconsole, MSFcli, and MSFencode.mp4 | 24.8 MB |
![]() | 1 - Introduction to the Metasploit Framework/The Course Overview.mp4 | 3.7 MB |
![]() | 2 - Pentesting Lab Setup/Installation of Kali Linux.mp4 | 25.8 MB |
![]() | 2 - Pentesting Lab Setup/Installation of Virtual Machine.mp4 | 30.3 MB |
![]() | 2 - Pentesting Lab Setup/Installation of Windows10.mp4 | 38.1 MB |
![]() | 3 - Information Gathering with Metasploit/Information Gathering.mp4 | 35.4 MB |
![]() | 3 - Information Gathering with Metasploit/Metasploit Port Scanners.mp4 | 31.6 MB |
![]() | 3 - Information Gathering with Metasploit/Port Scanning Techniques.mp4 | 13.8 MB |
![]() | 3 - Information Gathering with Metasploit/Port Scanning with Nmap.mp4 | 27.3 MB |
![]() | 4 - Vulnerability Scanning with Metasploit/Nessus Installation.mp4 | 33.9 MB |
![]() | 4 - Vulnerability Scanning with Metasploit/Scanning a Website for Vulnerabilities.mp4 | 43.6 MB |
![]() | 4 - Vulnerability Scanning with Metasploit/Using Nessus by Writing Metasploit.mp4 | 48.7 MB |
![]() | 4 - Vulnerability Scanning with Metasploit/Vulnerability Scanning.mp4 | 5.6 MB |
![]() | 5 - Exploitation with Metasploit/Exploitation Overview.mp4 | 7 MB |
![]() | 5 - Exploitation with Metasploit/Network Exploitation.mp4 | 39.1 MB |
![]() | 5 - Exploitation with Metasploit/Website Exploitation.mp4 | 43.5 MB |
![]() | 5 - Exploitation with Metasploit/Windows Exploitation.mp4 | 34.8 MB |
![]() | 6 - Post-Exploitation with Metasploit/Bypassing UAC.mp4 | 32.7 MB |
![]() | 6 - Post-Exploitation with Metasploit/Meterpreter Scripts.mp4 | 27.9 MB |
![]() | 6 - Post-Exploitation with Metasploit/Meterpreter.mp4 | 37.3 MB |
![]() | 6 - Post-Exploitation with Metasploit/Post-Exploitation – Overview.mp4 | 6.8 MB |
![]() | 7 - Advanced Exploitation with Metasploit/Client-Side Attack – Overview.mp4 | 50.4 MB |
![]() | 7 - Advanced Exploitation with Metasploit/MSFencode Attack.mp4 | 37.2 MB |
![]() | 7 - Advanced Exploitation with Metasploit/Social Engineering Toolkit.mp4 | 39.8 MB |
![]() | 7 - Advanced Exploitation with Metasploit/Social Engineering.mp4 | 6.4 MB |
![]() | Discuss.FreeTutorials.Us.html | 165.7 KB |
![]() | FreeCoursesOnline.Me.html | 108.3 KB |
![]() | FreeTutorials.Eu.html | 102.2 KB |
![]() | Presented By SaM.txt | 33 B |
Alternative Torrents for 'FreeCoursesOnline.Me Packtpub.Com Hands Penetration Testing with Metasploit FCO'. |
---|
There are no alternative torrents found.