Course Description:

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research. The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.

95% of Security professionals use distribution like Kali Linux/Backtrack which consists tons of tools that aids pentesters to perform audits and Metasploit Framework is highly sophisticated tool. The course is designed as a complete guide to understand and handle Metasploit Tool efficiently in real time.

The course is very well structured, explaining the terminologies , functionality and lab practicals are very well shown as feeding baby a banana.


Who is the target audience?

  • Computer Science Students
  • IT Security Auditors
  • Ethical Hacking studying students

What are the requirements?

  • Basics of computers and virtual machines
  • Basic knowledge of information security and its terminologies.
  • Understanding of unix and windows operating systems.

What am I going to get from this course?

  • Master the art of penetration testing using metasploit.
  • Understand the concepts of attack and defence using msf console.
  • Perform real-time attacks on virtual machines to test your pentesting abilities using metasploit.
  • Step-by-step demonstration of the Metasploit framework using real-time examples, diagrams, and presentations for theoretical topics
  • Covers all phases of penetration testing in detail including additional tools, such as Nmap, and Nessus


  • Introduction to PENETRATION TESTING
  • PENETRATION TESTING Execution Standard
  • Intelligence gathering
  • vulnerability scanning
  • The joy of exploitation
  • Meterpreter
  • Avoiding detection
  • Exploitation Using Client-side attacks
  • METASPLOIT auxiliary module
  • Post Exploitation
  • Fast-Track
  • Karmetasploit
  • Building your own Metasploit module