Penetration Testing With the Metasploit Framework [Online Code]

Price: $49.99
Product prices and availability are accurate as of 2018-08-20 04:22:01 UTC and are subject to change. Any price and availability information displayed on http://www.amazon.com/ at the time of purchase will apply to the purchase of this product.
Availability: Not Available - stock arriving soon
CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED 'AS IS' AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.

Manufacturer Description

Number of Videos:3.5 hours - 69 lessons
Ships on:DVD-ROM User Level: Intermediate< br/ > A necessary requirement for safeguarding any organization's computer system and network systems from adversarial attack is discovering the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity professional Ric Messier shows you how to use Metasploit, the open source, multi-platform (Linux, Windows, Mac OS) make use of structure deployed by systems administrators and security engineers everywhere to spot those vulnerabilities.

< br/ > You'll discover how to download, set up, and set up the software; how to extend Metasploit; how to perform system reconnaissance and vulnerability identification objectives; how to use exploits; and the basics of social engineering attacks, such as phishing and site cloning.
  • Discover to perform fundamental network and system security scans utilizing Metasploit
  • Understand Metasploit's command line, graphical, and web interfaces
  • Survey reconnaissance methods like Nmap scanning, SYN scanning, and service scanning
  • Explore vulnerability identification practices like SMB and VNC open service scanning
  • Discover to use the exploits in Metasploit to attack systems and determine system vulnerability
  • See how to establish customized security functions utilizing Ruby scripts
  • Explore phishing attacks, site cloning, and more
Ric Messier (GCIH, GSEC, CEH, CISSP) directs the Cybersecurity & Digital Forensic Programs at Champlain College in Burlington, Vermont. He likewise runs the private security firm WasHere Consulting and is a Senior Consultant with the security firm IP Architects, LLC. He holds a Masters of Digital Forensic Science from Champlain College and a Ph.D. in Information Assurance and Security from Capella University. Ric is the author of 16 O'Reilly titles, including "Introduction to Penetration Testing", "Learning Linux Security", and "Introduction to Wireshark".

< br/ > Mac Minimum System Requirements:
  • Mac Recommended System Requirements:
  • Processor: Any
  • RAM: Any Tough Disk: 1GB Video Card: Any Supported OS: Mac El Capitan 10.11, Mac Yosemite 10.10, Mac Mavericks 10.9, Mac Mountain Lion 10.8, Mac Lion 10.7, Mac Snow Leopard 10.6, Mac Leopard 10.5, Mac OS X, Macintosh
    < td design="vertical-align: top" >

    Product Features

    Learn Penetration Testing With the Metasploit Framework from a professional trainer on your own time at your own desk. This visual training method offers users increased retention and accelerated learning. Breaks even the most complex applications down into simplistic steps Comes with Extensive Working Files

    Write a Review