Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cybrary

Metasploit Training Course by Cybrary

via Cybrary

Overview

This course aims to teach learners how to utilize the deep capabilities of Metasploit for penetration testing and prepare them to conduct vulnerability assessments for organizations of any size. The course covers hands-on walkthroughs and practical exercises to enhance skills in penetration testing using Metasploit. The teaching method involves a series of lessons with a focus on practical application. This course is intended for individuals interested in cybersecurity, penetration testing, and vulnerability assessment.

Syllabus

Metasploit Training Course (Lesson 1 of 5) | Introduction | Penetration Testing | Cybrary.
Metasploit Training Course (Lesson 2 of 5) | Hands-On Walkthrough | Penetration Testing | Cybrary.
Metasploit Training Course (Lesson 3 of 5) | Hands-On Walkthrough | Penetration Testing | Cybrary.
Metasploit Training Course (Lesson 4 of 5) | Hands-On Walkthrough | Penetration Testing | Cybrary.
Metasploit Training Course (Lesson 5 of 5) | Hands-On Walkthrough | Penetration Testing | Cybrary.

Taught by

Cybrary

Reviews

4.5 rating, based on 11 Class Central reviews

Start your review of Metasploit Training Course by Cybrary

  • I think this course will help me and many others who are struggling with learning Metasploit learn more about it and go even further in the computer science field.
  • Profile image for Steven Mardavich
    Steven Mardavich
    A Metasploit training course equips individuals with the essential skills to navigate the intricate landscape of cybersecurity. It delves into the core functionalities of Metasploit, a powerful penetration testing framework, enabling learners to com…
  • Samuel Canfield
    This Course was very informative on how to set up Metasploit with some information about how to use the program when it is eventually set up, with one example being how to turn the virtual machine to host only when privacy for a machine is needed. One thing that I enjoyed about this course was the attention to detail during the setup phase, this would be a fantastic course for those who have never used Metasploit before as it gives extremely valuable information about how to set up the environment. The only thing that I would have liked to see in this course is a more thorough guide on how to use Metasploit in different ways.
  • Hunter Mulacek
    The Metasploit Training Course served as a great introductory set of videos for individuals unfamiliar with what the Metasploit Framework is, and how Kali Linux can be installed to leverage said framework. Additionally, I think there was a good high-level explanation of the different pieces of Metasploit and enough information to keep the viewer intrigued.

    Overall, I think this is a great starting point for individuals looking to gain experience with using pentesting tools.
  • Profile image for Thomas Simakis
    Thomas Simakis
    This introductory course over Metasploit is a great course that allows beginners and intermediate users to learn how to download a virtual box as well as using Metasploit across a network to scan for any open vulnerabilities across a network or target's network
  • Robert Laggan
    hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
  • Ethan Krol
    I've known a little bit about Kali in the past but in a way this was helpful. In summary, these videos seem to be meant as an intro into kali but I don't see how Metasploit was involved in this, maybe it is discussed in another video.
  • Profile image for Sean Green
    Sean Green
    Very thorough and in-depth look at how to install Kali Linux and Metasploit. It covers the basics of Metasploit and the file path to Metasploit and what each folder contains.
  • Griffin Voyk
    Useful information regarding the setup and usage of Metasploit and the Kali Linux operating system. Video host provides clear and concise information.
  • Mike Peronek
    The content itself is very helpful, it explains everything in detail and is extremely useful for the average user to get started. However there is an issue with how it is presented. For an IT related situation, the quality of the videos was quite lackluster. Audio and video were subpar unfortunately, making it a difficult watch. I’m giving the content 4 stars but the actual quality makes it feel more like a 2 or a low 3.
  • Profile image for Josh Kardules
    Josh Kardules
    I thought that the videos were a good way to get introduced to metasploit, they were segmented well and none of them were too long. Although I already had a general understanding of metasploit I also was able to learn a decent amount for how short the videos were.

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.