• Online, Self-Paced
Course Description

An IT Administrator plays an important role ensuring the security of an organization, this includes digital methods of communication. SharePoint is a widely utilized application which requires proper configuration to ensure the security of a system. Through the use of Metasploit and associated tools, students can simulate attacks, be it internal or external, allowing an Administrator to identify the security level of a SharePoint Environment.

Learning Objectives

  • Metasploit Setup and Configuration
  • Metasploit Framework and Structure
  • Finding Targets Through Scanning
  • Exploitation and Payload Techniques
  • Pivoting, Port Forwarding, Token Stealing, and Impersonation
  • Metasploit and SharePoint
  • Protecting SharePoint from Metasploit

    Framework Connections

    The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.