Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

IBM

Exploitation and Penetration Testing with Metasploit

IBM via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Metasploit is one of the best-known and most used cybersecurity technologies for penetration testing (Cyber Security News). This short course gives you the job-ready skills in exploitation techniques and penetration testing using Metasploit employers are looking for. During the course, you’ll explore Metasploit’s core functionalities, gaining valuable hands-on experience in exercises that cover real-world exploitation scenarios, including network, system, and web application attacks. Plus, you’ll dive into post-exploitation tactics, persistence techniques, and attack simulations, building the skills you need for both ethical hacking and red teaming. By the end of the course, you’ll be able to conduct advanced penetration tests, execute sophisticated exploits, and understand the tactics used by attackers to compromise systems. Plus, you’ll be able to identify vulnerabilities and implement effective countermeasures to defend against these threats. If those are hands-on skills you want on your resume in 4 weeks’ time, enroll today!

Syllabus

  • Metasploit Setup and Core Exploitation Techniques
    • In this module, you'll be introduced to the Metasploit Framework, covering its installation, interface, and the foundational concepts of exploitation. You'll learn how to set up Metasploit, identify key components like payloads and sessions, and perform basic exploitation tasks in a safe environment.
  • Exploit Development and Auxiliary Module Usage
    • In this module, you'll build on your foundational knowledge as you explore auxiliary modules, session handling, and the basics of exploit development. You'll simulate attacks, modify existing exploits, and apply fuzzing techniques to discover vulnerabilities, bridging theory with real-world offensive security tasks.
  • Post-Exploitation and Attack Simulations
    • In this module, you will explore techniques attackers use after compromising a system, including privilege escalation, persistence mechanisms, evasion techniques, and network attack simulations.
  • Web and Social Engineering Attacks
    • In this module, you'll explore exploitation techniques that target web applications and human vulnerabilities. You'll learn how attackers compromise web apps, use phishing, and perform physical and USB-based attacks.
  • Final Project: Simulated Penetration Test Using Metasploit
    • This module serves as the capstone for the course, where learners will apply all acquired skills to conduct a comprehensive penetration test using Metasploit.

Taught by

IBM Skills Network Team and Christo Oehley

Reviews

4.2 rating at Coursera based on 28 ratings

Start your review of Exploitation and Penetration Testing with Metasploit

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.