Course information

Mastering Metasploit Framework Course Outline

Module 1: Introduction to Metasploit Framework

  • Metasploit Framework
  • Implementation
  • Pro Components
  • Basic Concepts
  • Pro Workflow

Module 2: Using Metasploit Web Interface

  • Supported Browsers
  • Navigational Menus and Features
  • Touring the Projects Page

Module 3: Getting Started with Metasploit Framework

  • Creating a Project
  • Getting Target Data
  • View and Manage Host Data
  • Exploiting Known Vulnerabilities
  • Post-Exploitation and Collecting Evidence
  • Cleaning Up Sessions
  • Generating a Report

Module 4: Setting Up a Vulnerable Target

  • Downloading and Setting Up Metasploitable
  • Services
  • Weak Passwords
  • Vulnerable Web Services

Module 5: Managing Projects

  • Export Project Data
  • Adding Users to Project
  • Removing Users from a Project
  • Assigning Project to User
  • Host Comments

Module 6: Managing and Updating Metasploit

  • Managing User Accounts
  • Managing License Keys
  • Verifying Downloads with SHA-1 Hashes
  • Accessing Logs
  • Backing Up and Restoring Metasploit Data
  • Notification Center
  • Updating Metasploit
  • Restarting Metasploit Services

Module 7: Managing Hosts

  • Host Management Interfaces
  • Adding and Deleting Hosts
  • Viewing and Editing Host Metadata
  • Add, Edit, and Delete Service
  • Add, Edit, and Delete Vulnerabilities

Module 8: Exploring Vulnerabilities

  • Discovery Scan
  • Vulnerability Scanning with Nexpose
  • Importing Data
  • Validating a Vulnerability
  • Working with the Vulnerability Validation Wizard
  • Validating Vulnerabilities Discovered by Nexpose
  • Sharing Validation Results with Nexpose

Module 9: Working with Payloads

  • Single and Staged Payloads
  • Viewing Payloads
  • Manually Selecting a Payload
  • Auto Selecting a Payload
  • Payload Generator

Module 10: Introduction to Credentials

  • Understanding Credentials
  • Managing
  • Reusing
  • Searching
  • Bruteforce Attacks

Module 11: Overview of Metamodules

  • Credentials Domino MetaModule
  • Single Credential Testing MetaModule
  • SSH Key Testing MetaModule
  • Known Credentials Intrusion MetaModule
  • Segmentation and Firewall Testing MetaModule

Module 12: Social Engineering

  • Introduction to Social Engineering
  • Managing Campaigns

Module 13: Automating Tasks

  • Working with Task Chains
  • Adding a Task to a Task Chain
  • Manage and Edit Task Chains
  • Scheduling Task Chains

Module 14: Introduction to Reporting

  • Audit Reports
  • Credentials Report
  • FISMA and PCI Compliance Report
  • Social Engineering Campaign Details Report
  • Custom Templates
  • MetaModule Reports

Module 15: Metasploit Framework

  • Accessing MSFconsole
  • Managing Database and Workspaces
  • Modules
  • Run Metasploit Remotely
  • Tag Hosts in MFSconsole    

Module 16: Working with Pro Console

  • About Pro Console
  • Auto-Exploitation
  • Manage Credentials
  • Managing Notes, Tasks, and Vulnerabilities
  • Scanning and Managing Hosts
  • Pro Console Reports 

Show moredowndown

Who should attend this Mastering Metasploit Framework Course?

The Metasploit Course teaches professionals how to harness the power of Metasploit to discover, exploit, and validate vulnerabilities. This course is beneficial for various professionals, including:

  • Penetration Testers
  • Ethical Hackers
  • Security Engineers
  • Network Administrators
  • Security Consultants
  • Cybersecurity Researchers
  • Red Team Members
  • Blue Team Members (Defensive Security)

Prerequisites of the Mastering Metasploit Framework Course

There are no formal prerequisites for attending the Metasploit Course.

Mastering Metasploit Framework Course Overview

Metasploit Framework is a powerful tool for penetration testing and vulnerability exploitation. This course covers key aspects of Metasploit, including scanning, exploiting vulnerabilities, and writing custom modules, making it essential for enhancing security testing capabilities. Mastery of the Metasploit Framework is crucial for identifying system weaknesses and improving an organisation's overall security posture.

This course is particularly beneficial for Ethical Hackers, Penetration Testers, Security Analysts, and IT Professionals responsible for safeguarding systems from cyber threats. Understanding how to effectively use Metasploit enables professionals to simulate real-world cyber-attacks, identify vulnerabilities, and implement the necessary defences. The course is invaluable for those looking to strengthen their offensive security skills and stay ahead of evolving cyber threats.

The Knowledge Academy’s 1-day course provides comprehensive instruction on using Metasploit for penetration testing. Participants will learn how to scan networks, exploit vulnerabilities, and develop custom payloads. Through hands-on exercises and expert guidance, delegates will gain the practical skills needed to perform in-depth security assessments using Metasploit and protect their organisations against potential attacks.

Course Objectives

  • To introduce the fundamentals of the Metasploit Framework and its applications
  • To understand how to scan networks and identify vulnerabilities using Metasploit
  • To learn techniques for exploiting system vulnerabilities and weaknesses
  • To explore methods for writing custom Metasploit modules and payloads
  • To develop skills in performing penetration tests and security assessments
  • To prepare delegates for applying Metasploit to enhance their organisation's security defences

Upon course completion, delegates will have a solid understanding of the Metasploit Framework and the practical skills to conduct effective penetration tests. They will be equipped to identify system vulnerabilities, exploit weaknesses ethically, and enhance the security posture of their organisations, positioning themselves as skilled cybersecurity professionals.

Show moredowndown

What’s included in this Mastering Metasploit Framework Course?

  • World-Class Training Sessions from Experienced Instructors
  • Metasploit Certificate
  • Digital Delegate Pack

Why choose us

Our Hong Kong venue

Includes..

Free Wi-Fi

To make sure you’re always connected we offer completely free and easy to access wi-fi.

Air conditioned

To keep you comfortable during your course we offer a fully air conditioned environment.

Full IT support

IT support is on hand to sort out any unforseen issues that may arise.

Video equipment

This location has full video conferencing equipment.

Hong Kong is an autonomous territory of the People’s Republic of China and can be located on the southern coast of China. Hong Kong has a population of around 7 million people. The education system in Hong Kong is mostly based around the English system and it is overseen by the Education Bureau and the Social Welfare Department. One of the earliest schools in Hong Kong was Li Ying College established in 1075. The education level begins with preschool education that is payable education, paid by pupil’s parents. The primary and secondary education is mandatory for every child in Hong Kong to attend from the age of 6 to 18. Higher education remains exclusive in Hong Kong and adult education is a growing sector in Hong Kong, with two non-profit school running evening courses. The University of Hong Kong was founded in 1911 and is the oldest tertiary (higher education) institution in Hong Kong and is organised into 10 academic faculties with English as the main language of instruction. The Education Bureau in Hong Kong also provides educational services for immigrant children from mainland China and other countries. Hong Kong also has 175 internal schools.

Show moredown

Address

62/F & 66/F
The Center
99 Queens Road
Central
Hong Kong

T: +852 2592 5349

Ways to take this course

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led Metasploit Training in Hong Kong. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

Unlock your potential with The Knowledge Academy's Metasploit Training in Hong Kong, accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.

What our customers are saying

Metasploit Training in Hong Kong FAQs

The Metasploit Framework is an advanced open-source penetration testing platform that provides cybersecurity professionals with tools to identify, exploit, and patch vulnerabilities in systems, applications, and networks. It helps simulate attacks and assess security weaknesses in a controlled environment.
Mastering Metasploit equips Cybersecurity Professionals with the ability to simulate real-world cyberattacks, perform vulnerability assessments, and create custom exploits. This expertise is crucial for proactively securing networks, strengthening defences, and minimising security risks in an ever-evolving threat landscape.
Key features of Metasploit include exploit development, customisable payloads, vulnerability scanning, penetration testing automation, post-exploitation tools, and integration with various third-party security tools. These features make it an essential tool for conducting comprehensive security assessments.
In this course, you will learn the core concepts of Metasploit, including vulnerability identification, exploit development, payload creation, post-exploitation techniques, and real-world penetration testing scenarios. You'll gain hands-on experience using Metasploit to perform ethical hacking tasks.
The course includes instructor-led training, hands-on labs, real-world case studies, practical exercises, access to the Metasploit Framework, and supplementary learning materials such as guides and tutorials. You'll also get access to an exam to certify your skills.
Delegates should have a solid understanding of networking concepts, cybersecurity basics, operating systems (Windows and Linux), and some prior experience in penetration testing or vulnerability assessment. Familiarity with scripting languages is also beneficial.
This course is ideal for cybersecurity professionals such as Penetration Testers, Ethical Hackers, Security Analysts, IT Auditors, Vulnerability Analysts, and IT Security Consultants who want to advance their knowledge in exploiting vulnerabilities and conducting security assessments.
Yes, we provide comprehensive support throughout the course, including instructor assistance, technical support, and access to online resources and forums. You'll have 24/7 access to help and guidance to ensure a seamless learning experience.
No, this course does not include an examination.
The course covers a wide range of topics, including Metasploit fundamentals, setting up a penetration testing environment, vulnerability scanning, exploit creation, payload generation, post-exploitation techniques, and defence evasion. It also delves into integrating Metasploit with other security tools.
Professionals proficient in Metasploit can pursue roles such as Penetration Tester, Ethical Hacker, Vulnerability Analyst, Cybersecurity Engineer, Security Consultant, and IT Security Specialist. Metasploit skills are highly valued in industries requiring robust security testing.
You can register for the course through the official website of the training provider or by contacting the admissions or customer support team for registration assistance. Ensure to verify course availability and schedule details.
Yes, upon successfully completing the course, delegates will receive a certification that demonstrates your expertise in using the Metasploit Framework for penetration testing and vulnerability assessment.
If you encounter issues accessing your certification or course materials, please contact the knowledge academy's provider's customer support or technical team. They will assist you in resolving access problems and provide any necessary guidance.
The Knowledge Academy in Hong Kong is a prestigious training provider known for its extensive course offerings, expert instructors, adaptable learning formats, and industry recognition. It's a dependable option for those seeking these courses.
The training fees for Mastering Metasploit Frameworkin Hong Kong starts from HKD8795
The Knowledge Academy is the Leading global training provider for Mastering Metasploit Framework.
Show more down

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on Ethical Hacking Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on +852 2592 5349 and speak to our training experts, we should be able to help you with your requirements.

cross

BIGGEST
BLACK FRIDAY SALE!

red-starWHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.