This course is designed to cover Metasploit from the ground up. Note there is some overlap between this course and the general hacking course that we offer. The general hacking will do some limited Kali and Metasploit.
Introduction to Linux (optional) Linux history Linux file structure and directories Linux shall commands Ls, cd, ps, pstree, top, touch, grep, mkdir, apt-get, cat, dmesg, find, Introduction to Kali Setting up Kali Recon-ng Wi-Fi honey Hashcat Macchanger Ghost phisher Sparta John the ripper Dmitry Metasploit fundamentals Metasploit structure Basic Metasploit commands Metasploit scans (SSH, FTP, SMB, DNS, SQL Server, nmap) Basic attacks (this begins with easy attacks that are very likely to work, and are against easy targets) At least 8 different attacks against less secure Windows variants are explored. In depth discussion of why these attacks work and how they work How to find exploits More with Metasploit Leaning to use msfvenom Attacking more secure Windows variants (i.e. patched and firewalled) Attacking Linux boxes Attacking Android Advanced Metasploit Anti-virus avoidance techniques Firewall evasion techniques Moving through a router Pivoting