Ethical Hacking with Metasploit: Exploits, Payloads and Post-Exploitation Techniques
This hands-on course introduces learners to the Metasploit Framework, a widely used open-source platform for simulating cyberattacks. Participants will build a secure, isolated lab environment and explore core components of Metasploit, including exploits, payloads (such as Meterpreter), auxiliary modules, and post-exploitation tools. Through guided exercises, they will learn to identify and exploit vulnerable systems, gaining essential skills for ethical hacking and penetration testing.
Content
• Setting up a secure and isolated virtual lab for ethical hacking
• Overview of Metasploit architecture and key components
• Vulnerability scanning with auxiliary modules
• Exploiting vulnerabilities in Windows and Linux systems
• Understanding and applying payloads, including Meterpreter
• Establishing persistence through backdoors
• Using post-exploitation tools for privilege escalation and system interaction
Learning Outcomes
On successful completion of this course, learners will be able to:
• Set up and manage a secure virtual lab environment for ethical hacking and penetration testing
• Identify and describe the core components of the Metasploit Framework, including exploits, payloads, auxiliary modules, and post-exploitation tools
• Perform vulnerability scanning and analyze results using Metasploit’s auxiliary modules
• Select, configure, and deploy exploits and payloads to access target systems
• Apply post-exploitation techniques for privilege escalation, data extraction, and lateral movement
Training Method
The course combines theoretical instruction with practical application. Core concepts are introduced using structured presentations, followed by guided lab activities that allow participants to apply techniques in a secure environment. The training emphasizes active learning through real-world simulations, with opportunities for individual experimentation and troubleshooting.
Additional Information
This is an intermediate level course, suitable for learners with foundational knowledge of operating systems and computer networking, seeking to expand their skills in ethical hacking using Metasploit.Certification
Certificate of ParticipationPrerequisites
Participants should have a working knowledge of operating systems and basic networking concepts, including the OSI model, IP addressing, and protocols such as TCP, UDP, and ICMP. An interest in network protocol analysis and familiarity with Linux command-line interface (CLI) is recommended.
Planning and location
18:00 - 21:00
18:00 - 21:00
18:00 - 21:00
18:00 - 21:00
Your trainer(s) for this course
Amirhossein ADAVOUDI
View all their courses.Amirhossein Adavoudi holds a PhD in Cybersecurity from the University of Luxembourg and brings over a decade of experience in the field. He specializes in security and privacy analysis as well as cybersecurity research. He is also interested in teaching courses on ethical hacking.