This course is ideal for penetration testers, security enthusiasts and network administrators.
A non-exhaustive list of topics to be taught includes:
– Metasploit Basics and Framework Organization
– Server and Client Side Exploitation
– Meterpreter – Extensions and Scripting
– Database Integration and Automated Exploitation
– Post Exploitation Kung-Fu – Exploring the system, Privilege escalation, Log deletion and AV / Firewall bypass
– Token stealing and impersonation, Backdoors and Rootkits, Pivoting and Port forwarding, Railgun and Custom Scripting,
– Backdoor an Executable
– Exploit research with Metasploit- Buffer Overlows, SEH etc.
– Scenario Based Hacking using Metasploit
Text us for more details and titles. Thank you
Tips for Online Transactions
- Avoid scams by acting locally or paying with PayPal, Bank Deposit, LBC, or Pera Padala without the item.
- Never pay with anonymous payment services
- Don't buy or sell outside of your country. Don't accept cheques
- This site is never involved in any transaction, and does not handle payments, shipping, guarantee transactions, provide escrow services, or offer "buyer protection" or "seller certification"