Metasploit is one of the best-known and most used cybersecurity technologies for penetration testing (Cyber Security News). This short course gives you the job-ready skills in exploitation techniques and penetration testing using Metasploit employers are looking for.

Exploitation and Penetration Testing with Metasploit
访问权限由 Coursera Learning Team 提供
3,411 人已注册
您将学到什么
Build job-ready skills using the Metasploit framework, its architecture, and capabilities, to effectively support penetration testing activities.
Perform reconnaissance, vulnerability assessment, exploit execution, and post-exploitation tasks using Metasploit.
Develop, modify, and execute exploits for real-world attack scenarios, including network, web application, and social engineering.
Document penetration testing findings, generate actionable reports, and provide recommendations for security improvements.
您将获得的技能
要了解的详细信息

添加到您的领英档案
14 项作业
了解顶级公司的员工如何掌握热门技能

积累 Security 领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 通过 IBM 获得可共享的职业证书

该课程共有5个模块
In this module, you'll be introduced to the Metasploit Framework, covering its installation, interface, and the foundational concepts of exploitation. You'll learn how to set up Metasploit, identify key components like payloads and sessions, and perform basic exploitation tasks in a safe environment.
涵盖的内容
6个视频5篇阅读材料3个作业7个插件
In this module, you'll build on your foundational knowledge as you explore auxiliary modules, session handling, and the basics of exploit development. You'll simulate attacks, modify existing exploits, and apply fuzzing techniques to discover vulnerabilities, bridging theory with real-world offensive security tasks.
涵盖的内容
3个视频2篇阅读材料3个作业7个插件
In this module, you will explore techniques attackers use after compromising a system, including privilege escalation, persistence mechanisms, evasion techniques, and network attack simulations.
涵盖的内容
6个视频3篇阅读材料4个作业6个插件
In this module, you'll explore exploitation techniques that target web applications and human vulnerabilities. You'll learn how attackers compromise web apps, use phishing, and perform physical and USB-based attacks.
涵盖的内容
6个视频3篇阅读材料4个作业5个插件
This module serves as the capstone for the course, where learners will apply all acquired skills to conduct a comprehensive penetration test using Metasploit.
涵盖的内容
1个视频2篇阅读材料1个应用程序项目3个插件
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
提供方
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.









