I created a few information security courses for Pluralsight. you may want to check them out with a free 10-day trial.
The Metasploit Framework is a very capable exploitation toolkit. It is not an easy tool to quickly understand and utilize effectively. In this course, Metasploit: Getting Started, you’ll learn to use the Metasploit Framework to configure and launch exploits with payloads to compromise vulnerable target systems in a red team and penetration testing context. First, you’ll explore the Metasploit Framework architecture, which is key to understanding the framework’s capabilities and inner workings. Next, you’ll discover how to configure the Metasploit Framework for launching an attack. Finally, you’ll learn how to use the Metasploit Framework’s tools for post-exploitation activities once a system has been compromised. When you’re finished with this course, you’ll have the skills and knowledge of configuring and launching penetration tests needed to effectively use the Metasploit Framework.
Published: September 4, 2020
There are many components to an organization’s information security program. If you are new to cybersecurity or interested in getting started, it can be difficult to identify and understand all of the facets of protecting an organization’s information assets. In this course, Introduction to Information Security, you will learn about the information security programs used by organizations. First, you will learn about the foundational principles of information security, such as confidentiality, integrity, governance, risk management, and compliance. Next, you will explore organizational assets and how they are protected through the use of security controls. Then, you will take a look at how auditing, monitoring, and testing is used to review and evaluate the effectiveness of those security controls. Finally, you will discover how organizations manage and prepare for security incidents, disruptions, and disasters and how they manage the day-to-day operations of an information security program. When you are finished with this course, you will have the knowledge and understanding of the bigger picture of information security.
Published: August 14, 2018
As more businesses create, collect, and manage large volumes of customer data and provide access to that data through mobile apps, the Web, and IoT devices, there are more opportunities for that data to be compromised and stolen by nefarious individuals, criminal groups, and even governments. Organizations are struggling to improve the accessibility to and increase the value of their intellectual property while simultaneously protecting it from unauthorized exposure. As news in the past few years has shown, this is a significant challenge and many organizations lost control over their customer’s data and their own intellectual property. Penetration testing is one technique that organizations use to find and correct weaknesses in their network and systems before someone else does. First, you will learn how penetration testing serves as key component in an organization’s information security management program. Next, you will learn about the penetration testing process and techniques used to discover and exploit vulnerabilities. Finally, you will have a good understanding of the software tools, certifications, and other courses that can help you build your technical skills. When you finish this course, you will have the knowledge of how penetration testing is used to improve the security of a network and the techniques and tools used to conduct the testing.
Published: October 6, 2017
Metasploit is one of the most widely used tools for penetration testing, providing powerful attack simulations, security assessment management, and more. In this course, Introduction to Penetration Testing Using Metasploit, you’ll learn to use Metasploit to enumerate available services, identify potential weaknesses, test vulnerabilities through exploitation, and gather evidence for reporting. First, you’ll see how to install and configure the Metasploit Framework and several supporting tools on Kali Linux. Next, you’ll explore how exploits and payloads work together to gain access to systems. Finally, you’ll look at how Metasploit Framework releases are made available and how to maintain the latest version of the Framework. By the end of this course, you’ll have a better understanding of how to use Metasploit to quickly assess the security posture of systems and networks to reduce risk.
Published: June 16, 2016