Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.



Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Course Information

Mastering Metasploit Framework Course Outline

The following course content has been built to help you build a strong foundation in penetration testing.

Introduction to Metasploit Framework

  • Define the Metasploit Framework
  • Metasploit Implementation
  • Metasploit Pro Components
  • Basic Concepts and Terms
  • Metasploit Pro Workflow
  • Access Metasploit Pro from the Web Interface

Using Metasploit Web Interface

  • Supported Browsers
  • Navigational Menus and Features
  • Touring the Projects Page

Getting Started with Metasploit Framework

  • Creating a Project
  • Getting Target Data
  • View and Manage Host Data
  • Running a Vulnerability Scan
  • Exploiting Known Vulnerabilities
  • Post-Exploitation and Collecting Evidence
  • Cleaning Up Sessions
  • Generating a Report

Setting Up a Vulnerable Target

  • Downloading and Setting Up Metasploit
  • Services
  • Weak Passwords
  • Vulnerable Web Services

Managing Projects

  • Create and Manage Projects
  • Export Project Data
  • Adding Users to Project
  • Removing Users from Project
  • Assigning Project to User
  • Host Comments

Managing and Updating Metasploit

  • Managing User Accounts
  • Managing License Keys
  • Verifying Downloads
  • Verifying Downloads with SHA-1 Hashes
  • Accessing Logs
  • Backing Up and Restoring Metasploit Data
  • Notification Center
  • Updating Metasploit
  • Restarting Metasploit Services

Managing Hosts

  • Host Management Interfaces
  • Adding and Deleting Hosts
  • Viewing and Editing Host Metadata
  • Add, Edit, and Delete Service
  • Add, Edit, and Delete Vulnerabilities
  • View and Access File Shares

Exploring Vulnerabilities

  • Discovery Scan
  • Vulnerability Scanning with Nexpose
  • Importing Data
  • Validating a Vulnerability
  • Working with the Vulnerability Validation Wizard
  • Validating Vulnerabilities Discovered by Nexpose
  • Sharing Validation Results with Nexpose
  • Tracking Real-Time Statistics and Events


  • Using Exploits
  • Skipping Fragile Devices

Working with Payloads

  • Single and Staged Payloads
  • Viewing Payloads
  • Manually Selecting a Payload
  • Auto Selecting a Payload
  • Payload Generator

Introduction to Credentials

  • Understanding Credentials
  • Managing Credentials
  • Reusing Credentials
  • Searching Credentials
  • Bruteforce Attacks

Overview of Metamodules

  • Credentials Domino MetaModule
  • Single Credential Testing MetaModule
  • SSH Key Testing MetaModule
  • Known Credentials Intrusion MetaModule
  • Segmentation and Firewall Testing MetaModule

Social Engineering

  • Define Social Engineering
  • Managing Campaigns and Target Lists
  • Upload Custom SSL Certificates
  • Modify SSL Cipher for Web Servers
  • Best Practices for Social Engineering

Automating Tasks

  • Working with Task Chains
  • Manage and Edit Task Chains
  • Scheduling Task Chains
  • Resource Scripts

Introduction to Reporting

  • Audit Reports
  • Credentials Report
  • FISMA and PCI Compliance Report
  • Social Engineering Campaign Details Report
  • Customising Standard Reports
  • Custom Templates
  • MetaModule Reports

Metasploit Framework

  • Accessing MSFconsole
  • Managing Database and Workspaces
  • Modules
  • Run Metasploit Remotely
  • Tag Hosts in msfconsole

Working with Pro Console

  • About Pro Console
  • Auto-Exploitation
  • Export and Import Data
  • Manage Credentials
  • Manage Database from Pro Console
  • Managing Notes, Tasks, and Vulnerabilities
  • Manual Exploitation
  • Managing Metasploit
  • Pro Console Reports
  • Scanning and Managing Hosts

Show moredowndown


No prerequisites to attend this course. However, a basic understanding of network and Linux would be beneficial.


Anyone who wishes to understand and enhance their knowledge of Metasploit can attend this course. This course is ideal for:

  • Penetration Testers
  • Network Administrators
  • Cybersecurity Engineers
  • Security Enthusiasts and Professionals

Mastering Metasploit Framework ​Course Overview

A Metasploit framework is a powerful tool used by cybercriminals and ethical hackers to probe systematic vulnerabilities on servers and networks. It is an open-source project providing the content, infrastructure, and tools for performing penetration tests and extensive security auditing. It is a Ruby-based, modular penetration testing platform enabling you to write, test, and execute code.

The Knowledge Academy’s 2-day course will equip delegates with comprehensive knowledge about the working of Metasploit. This course will make delegates dive into the world’s leading open-source exploitation framework and will exhibit how to use it in every aspect of the penetration test. Delegates will learn how to manage user accounts and license keys. In addition, they will develop their knowledge and skillset whilst working with the vulnerability validation wizard.

During this course, delegates will learn how to manage and reuse credentials. Delegates will get to learn about the concept of metamodules and social engineering. Furthermore, delegates will acquire in-depth knowledge of how to manage database and workspace as well as how to run Metasploit remotely. Post completion of this training, delegates will be able to manage notes, tasks, and vulnerabilities. So, learn the significant techniques in Metasploit by attending our comprehensive course from scratch.

Show moredowndown

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor
  • Refreshments

Show moredowndown

Why choose us

Ways to take this course

Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.

Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.

This is our most popular style of learning. We run courses in 1200 locations, across 200 countries in one of our hand-picked training venues, providing the all important ‘human touch’ which may be missed in other learning styles.


Highly experienced trainers

All our trainers are highly qualified, have 10+ years of real-world experience and will provide you with an engaging learning experience.


State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible


Small class sizes

We limit our class sizes to promote better discussion and ensuring everyone has a personalized experience


Great value for money

Get more bang for your buck! If you find your chosen course cheaper elsewhere, we’ll match it!

This is the same great training as our classroom learning but carried out at your own business premises. This is the perfect option for larger scale training requirements and means less time away from the office.


Tailored learning experience

Our courses can be adapted to meet your individual project or business requirements regardless of scope.


Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.


Team building opportunity

This gives your team a great opportunity to come together, bond, and discuss, which you may not get in a standard classroom setting.


Monitor employees progress

Keep track of your employees’ progression and performance in your own workspace.

What our customers are saying

Mastering Metasploit Framework FAQs


Please arrive at the venue at 8:45am.
No prerequisites to attend this course. However, a basic understanding of network and Linux would be beneficial.
Anyone who wishes to understand and enhance their knowledge of Metasploit can attend this course. This course is ideal for: Penetration Testers, Network Administrators, Cybersecurity Engineers, Security Enthusiasts and Professionals
We are able to provide support via phone & email prior to attending, during and after the course.
Delegate pack consisting of course notes and exercises, Manual, Experienced Instructor, and Refreshments
This course is 1 day.
Once your booking has been placed and confirmed, you will receive an email which contains your course location, course overview, pre-course reading material (if required), course agenda and payment receipts
The price for Mastering Metasploit Framework certification in Philippines starts from $995
The Knowledge Academy is the Leading global training provider for Mastering Metasploit Framework.

Why choose us


Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.


Many delivery methods

Flexible delivery methods are available depending on your learning style.


High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on Ethical Hacking Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on +44 1344 203999 and speak to our training experts, we should be able to help you with your requirements.