Press esc to close
Press esc to close
Fill out your contact details below and our training experts will be in touch.
If you wish to make any changes to your course, please log a ticket and choose the category ‘booking change’
Back to Course Information
No prerequisites are required for attending this training course.
This Ethical Hacking Professional course is an introduction to the concepts, tools, and techniques involved in ethical hacking. Businesses have an ever-growing dependency on IT security, due to the increasing complexity of systems and networks, and particularly the usage of mobile and wireless devices. Security professionals warn us of the growing rate of hackers and their in-depth knowledge of how to overcome firewalls and standard security protocols, such as anti-malware. This 2-day training course will develop your awareness of common IT security problems on which hackers rely on for access, to be better able to avoid and prevent attacks.
Our training delivers a comprehensive overview of the types of attacks and methodologies used by hackers, helping you understand and gain experience in recognising, defeating, and preventing threats to your systems. You will receive exposure to technologies and software tools and show how they can be used in real-life scenarios.
Over the duration of the course, you will increase your knowledge of risks and vulnerabilities, the methods used to exploit them, as well as gain a wider understanding of cybersecurity, from penetration testing to writing assessment reports. Through instructor-led training and hands-on lab-based exercises, you will gain the skills to enter the industry or enhance your career as an ethical hacker. However, this course can be taken by anyone in an IT security-based role who wishes to understand the mindset of cyber attackers, to better assess their system vulnerabilities and protect your information, despite the constantly evolving cybersecurity environment.
The following course content has been built to help you build a strong foundation in penetration testing.
Introduction to Metasploit Framework
Using Metasploit Web Interface
Getting Started with Metasploit Framework
Setting Up a Vulnerable Target
Managing and Updating Metasploit
Working with Payloads
Introduction to Credentials
Overview of Metamodules
Introduction to Reporting
Working with Pro Console
No prerequisites to attend this course. However, a basic understanding of network and Linux would be beneficial.
Anyone who wishes to understand and enhance their knowledge of Metasploit can attend this course. This course is ideal for:
A Metasploit framework is a powerful tool used by cybercriminals and ethical hackers to probe systematic vulnerabilities on servers and networks. It is an open-source project providing the content, infrastructure, and tools for performing penetration tests and extensive security auditing. It is a Ruby-based, modular penetration testing platform enabling you to write, test, and execute code.
The Knowledge Academy’s 2-day course will equip delegates with comprehensive knowledge about the working of Metasploit. This course will make delegates dive into the world’s leading open-source exploitation framework and will exhibit how to use it in every aspect of the penetration test. Delegates will learn how to manage user accounts and license keys. In addition, they will develop their knowledge and skillset whilst working with the vulnerability validation wizard.
During this course, delegates will learn how to manage and reuse credentials. Delegates will get to learn about the concept of metamodules and social engineering. Furthermore, delegates will acquire in-depth knowledge of how to manage database and workspace as well as how to run Metasploit remotely. Post completion of this training, delegates will be able to manage notes, tasks, and vulnerabilities. So, learn the significant techniques in Metasploit by attending our comprehensive course from scratch.
Speak to a training expert for advice if you are unsure of what course is right for you. Give us a call on +32 35001305 or Enquire.
Course was run very smoothly, Richard our trainer was extremely knowledgeable and delivered the course in a succinct fashion with a twist of humour thrown in.
The course was great and the so was the trainer - brilliantly delivered and I would certainly recommend this course to my colleagues. Thanks to Richard for a great course and delivering it a tough environment virtually.
Richard was very knowledgeable and explained well
You won't find better value in the marketplace. If you do find a lower price, we will beat it.
We are accredited by PeopleCert on behalf of AXELOS
Flexible delivery methods are available depending on your learning style.
Resources are included for a comprehensive learning experience.
"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"
Joshua Davies, Thames Water