Press esc to close
Press esc to close
Fill out your contact details below and our training experts will be in touch.
If you wish to make any changes to your course, please log a ticket and choose the category ‘booking change’
Back to Course Information
The following course content has been built to help you build a strong foundation in penetration testing.
Introduction to Metasploit Framework
Using Metasploit Web Interface
Getting Started with Metasploit Framework
Setting Up a Vulnerable Target
Managing and Updating Metasploit
Working with Payloads
Introduction to Credentials
Overview of Metamodules
Introduction to Reporting
Working with Pro Console
No prerequisites to attend this course. However, a basic understanding of network and Linux would be beneficial.
Anyone who wishes to understand and enhance their knowledge of Metasploit can attend this course. This course is ideal for:
A Metasploit framework is a powerful tool used by cybercriminals and ethical hackers to probe systematic vulnerabilities on servers and networks. It is an open-source project providing the content, infrastructure, and tools for performing penetration tests and extensive security auditing. It is a Ruby-based, modular penetration testing platform enabling you to write, test, and execute code.
The Knowledge Academy’s 2-day course will equip delegates with comprehensive knowledge about the working of Metasploit. This course will make delegates dive into the world’s leading open-source exploitation framework and will exhibit how to use it in every aspect of the penetration test. Delegates will learn how to manage user accounts and license keys. In addition, they will develop their knowledge and skillset whilst working with the vulnerability validation wizard.
During this course, delegates will learn how to manage and reuse credentials. Delegates will get to learn about the concept of metamodules and social engineering. Furthermore, delegates will acquire in-depth knowledge of how to manage database and workspace as well as how to run Metasploit remotely. Post completion of this training, delegates will be able to manage notes, tasks, and vulnerabilities. So, learn the significant techniques in Metasploit by attending our comprehensive course from scratch.
Why choose us
Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.
Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.
Course was run very smoothly, Richard our trainer was extremely knowledgeable and delivered the course in a succinct fashion with a twist of humour thrown in.
The course was great and the so was the trainer - brilliantly delivered and I would certainly recommend this course to my colleagues. Thanks to Richard for a great course and delivering it a tough environment virtually.
Richard was very knowledgeable and explained well
You won't find better value in the marketplace. If you do find a lower price, we will beat it.
Flexible delivery methods are available depending on your learning style.
Resources are included for a comprehensive learning experience.
"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"
Joshua Davies, Thames Water