• Online, Self-Paced
Course Description

An IT Administrator plays an important role ensuring the security of an organization, this includes digital methods of communication. SharePoint is a widely utilized application which requires proper configuration to ensure the security of a system. Through the use of Metasploit and associated tools, students can simulate attacks, be it internal or external, allowing an Administrator to identify the security level of a SharePoint Environment.

Learning Objectives

  • Metasploit Setup and Configuration
  • Metasploit Framework and Structure
  • Finding Targets Through Scanning
  • Exploitation and Payload Techniques
  • Pivoting, Port Forwarding, Token Stealing, and Impersonation
  • Metasploit and SharePoint
  • Protecting SharePoint from Metasploit

    Framework Connections

    The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

    Specialty Areas

    • Exploitation Analysis
    • Vulnerability Assessment and Management

    Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

    Feedback

    If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.