The Knowledge Academy Logo
The Knowledge Academy Logo
01344 203999 - Available 24/7

Send us your message.


Classroom Training

Popular Tag

At The Knowledge Academy, our classroom-based training courses allow delegates to study and learn in a friendly, engaging, and interactive environment. We ensure the very best level of teaching, with first-rate instructors, resources, and state-of-the-art facilities. We provide courses of varying durations and can arrange weekend and residential courses in order to suit your requirements.

Furthermore, our classroom courses are carried out in thousands of locations worldwide, making training easily accessible wherever you are. Our courses typically begin at 9.00 am and continue until 5.00 pm each day, with breaks and refreshments provided. , As our most popular form of training available, we pride ourselves in continuously delivering an outstanding learning experience for our delegates in the classroom.

View classroom dates
  • Direct support from our experienced trainers throughout the course
  • Training courses available in thousands of locations globally
  • Partake in engaging and valuable activities in the classroom to boost your learning potential
  • Receive an all-encompassing learning experience

Online Training

Our online-based training courses aim to provide you with a complete training experience. Due to their flexibility, these courses are greatly suited to busy working professionals, or any individual who would prefer the convenience of an online training course.

Our Computer-Based Training (CBT) courses remove the time and cost associated with travelling to course locations. You can complete your chosen course in any location, and work at your own pace, as the learning portal can be accessed 24/7. All of our online training courses have technical and administrative support and mobile access. Furthermore, each course has been carefully designed to incorporate informative, instructive, and engaging content. In this way, online learning can guarantee a valuable and enjoyable training solution.

View online prices
  • Our flexible online courses provide you with 24/7 access
  • Take your time with 90 days from first login to complete the course
  • Enjoy an engaging and interactive learning experience
  • Courses available through our easy-to-use learning portal

Onsite Training

Our Onsite training option allows you to select any of our courses and receive training at a venue of your choice, by any method of your choice.

Onsite courses deliver training to multiple employees at once, thus reducing travel expenses and providing you with the ultimate convenience and value for money. In addition, this option allows you to receive a training course that has been specifically tailored to meet your business needs, ensuring first-class quality, applicability, and value.

By choosing to bring bespoke training to the office, you can improve business performance, and make your organisation more streamlined, resourceful, and profitable. With over 25 years’ of experience, we are the market-leaders of Onsite training.

Book onsite
  • Reduce the costs of employees taking time away from the workplace to train
  • Streamline your business with this bespoke training solution
  • Maximise your training budget
  • Monitor your employees’ progress and ensure that they receive applicable qualifications

Virtual Training

Our Virtual training courses provide you with the option to learn using a specialised simulated virtual environment. In this environment, our expert training instructors will be able to convey information and provide you with the all the knowledge you require to earn your qualification with The Knowledge Academy. As the largest global training provider, this method of training allows us to extend our training scope to those who may not be able to attend a classroom course itself, but would like to receive direct training and support from an instructor.
Using this training delivery method, you would benefit from the convenience of remote access and the elimination of the time and cost associated with travelling to a training venue.

View virtual dates
  • Receive direct support from our experienced trainers
  • Acquire the benefits of a classroom course, without the need to travel
  • Train from the comfort of your own home using remote access
  • All virtual training courses come with technical and administrative support

Mastering Metasploit Framework in Birmingham

Key points about this course

Duration: 1 Days *

Rating: Excellent

Language: English

Dates & Prices Enquire
  • Get an understanding of how to use Metasploit in penetration testing.
  • Learn how to back up and restore Metasploit data.
  • Accelerate your security professional career by attending our 1-day course.

Available delivery methods for this course

Classroom Icon


Onsite Icon


Online Icon


Virtual Icon

Live Virtual

Dates & Prices

Select your preferred delivery method

Choose a region

Choose a location

Choose a month

Office Icon Attend your course from the office or home
Trainer Icon Interactive support from experienced trainers
Simple Icon Simple to setup and easy to use on any device
Fri 13th Mar 2020
Places available
Fri 15th May 2020
Places available
Fri 10th Jul 2020
Places available
Fri 11th Sep 2020
Places available
Fri 13th Nov 2020
Places available

Complete the steps below to receive a quote or more information

How will you be funding your training?

Self funding

Company funding

Not sure

Key points about this course

Duration: 1 Days

Support: 24/7

Course Information

Mastering Metasploit Framework ​Course Overview

A Metasploit framework is a powerful tool used by cybercriminals and ethical hackers to probe systematic vulnerabilities on servers and networks. It is an open-source project providing the content, infrastructure, and tools for performing penetration tests and extensive security auditing. It is a Ruby-based, modular penetration testing platform enabling you to write, test, and execute code.

The Knowledge Academy’s 2-day course will equip delegates with comprehensive knowledge about the working of Metasploit. This course will make delegates dive into the world’s leading open-source exploitation framework and will exhibit how to use it in every aspect of the penetration test. Delegates will learn how to manage user accounts and license keys. In addition, they will develop their knowledge and skillset whilst working with the vulnerability validation wizard.

During this course, delegates will learn how to manage and reuse credentials. Delegates will get to learn about the concept of metamodules and social engineering. Furthermore, delegates will acquire in-depth knowledge of how to manage database and workspace as well as how to run Metasploit remotely. Post completion of this training, delegates will be able to manage notes, tasks, and vulnerabilities. So, learn the significant techniques in Metasploit by attending our comprehensive course from scratch.

Mastering Metasploit Framework Course Outline

The following course content has been built to help you build a strong foundation in penetration testing.

Introduction to Metasploit Framework

  • Define the Metasploit Framework
  • Metasploit Implementation
  • Metasploit Pro Components
  • Basic Concepts and Terms
  • Metasploit Pro Workflow
  • Access Metasploit Pro from the Web Interface

Using Metasploit Web Interface

  • Supported Browsers
  • Navigational Menus and Features
  • Touring the Projects Page

Getting Started with Metasploit Framework

  • Creating a Project
  • Getting Target Data
  • View and Manage Host Data
  • Running a Vulnerability Scan
  • Exploiting Known Vulnerabilities
  • Post-Exploitation and Collecting Evidence
  • Cleaning Up Sessions
  • Generating a Report

Setting Up a Vulnerable Target

  • Downloading and Setting Up Metasploit
  • Services
  • Weak Passwords
  • Vulnerable Web Services

Managing Projects

  • Create and Manage Projects
  • Export Project Data
  • Adding Users to Project
  • Removing Users from Project
  • Assigning Project to User
  • Host Comments

Managing and Updating Metasploit

  • Managing User Accounts
  • Managing License Keys
  • Verifying Downloads
  • Verifying Downloads with SHA-1 Hashes
  • Accessing Logs
  • Backing Up and Restoring Metasploit Data
  • Notification Center
  • Updating Metasploit
  • Restarting Metasploit Services

Managing Hosts

  • Host Management Interfaces
  • Adding and Deleting Hosts
  • Viewing and Editing Host Metadata
  • Add, Edit, and Delete Service
  • Add, Edit, and Delete Vulnerabilities
  • View and Access File Shares

Exploring Vulnerabilities

  • Discovery Scan
  • Vulnerability Scanning with Nexpose
  • Importing Data
  • Validating a Vulnerability
  • Working with the Vulnerability Validation Wizard
  • Validating Vulnerabilities Discovered by Nexpose
  • Sharing Validation Results with Nexpose
  • Tracking Real-Time Statistics and Events


  • Using Exploits
  • Skipping Fragile Devices

Working with Payloads

  • Single and Staged Payloads
  • Viewing Payloads
  • Manually Selecting a Payload
  • Auto Selecting a Payload
  • Payload Generator

Introduction to Credentials

  • Understanding Credentials
  • Managing Credentials
  • Reusing Credentials
  • Searching Credentials
  • Bruteforce Attacks

Overview of Metamodules

  • Credentials Domino MetaModule
  • Single Credential Testing MetaModule
  • SSH Key Testing MetaModule
  • Known Credentials Intrusion MetaModule
  • Segmentation and Firewall Testing MetaModule

Social Engineering

  • Define Social Engineering
  • Managing Campaigns and Target Lists
  • Upload Custom SSL Certificates
  • Modify SSL Cipher for Web Servers
  • Best Practices for Social Engineering

Automating Tasks

  • Working with Task Chains
  • Manage and Edit Task Chains
  • Scheduling Task Chains
  • Resource Scripts

Introduction to Reporting

  • Audit Reports
  • Credentials Report
  • FISMA and PCI Compliance Report
  • Social Engineering Campaign Details Report
  • Customising Standard Reports
  • Custom Templates
  • MetaModule Reports

Metasploit Framework

  • Accessing MSFconsole
  • Managing Database and Workspaces
  • Modules
  • Run Metasploit Remotely
  • Tag Hosts in msfconsole

Working with Pro Console

  • About Pro Console
  • Auto-Exploitation
  • Export and Import Data
  • Manage Credentials
  • Manage Database from Pro Console
  • Managing Notes, Tasks, and Vulnerabilities
  • Manual Exploitation
  • Managing Metasploit
  • Pro Console Reports
  • Scanning and Managing Hosts


No prerequisites to attend this course. However, a basic understanding of network and Linux would be beneficial.


Anyone who wishes to understand and enhance their knowledge of Metasploit can attend this course. This course is ideal for:

  • Penetration Testers
  • Network Administrators
  • Cybersecurity Engineers
  • Security Enthusiasts and Professionals
Please arrive at the venue at 8:45am.
No prerequisites to attend this course. However, a basic understanding of network and Linux would be beneficial.
Anyone who wishes to understand and enhance their knowledge of Metasploit can attend this course. This course is ideal for: Penetration Testers, Network Administrators, Cybersecurity Engineers, Security Enthusiasts and Professionals
We are able to provide support via phone & email prior to attending, during and after the course.
Delegate pack consisting of course notes and exercises, Manual, Experienced Instructor, and Refreshments
This course is 1 day.
Once your booking has been placed and confirmed, you will receive an email which contains your course location, course overview, pre-course reading material (if required), course agenda and payment receipts
The price for Mastering Metasploit Framework certification in Birmingham starts from £1595
The Knowledge Academy is the Leading global training provider in the world for Mastering Metasploit Framework.
  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor
  • Refreshments

Why choose TKA Logo

Gold Tag

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

Delivery Icon

Various delivery methods

Flexible delivery methods are available depending on your learning style.

Resource Icon


Resources are included for a comprehensive learning experience.

Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

Google Logo
Samsung Logo
Shell Logo

"...the trainer for this course was excellent. I would definitely recommend (and already have) this course to others."

Diane Gray, Shell

Mercedes Logo