Metasploit Classroom Program

DIPLOMA IN METASPLOIT 

Metasploit is one of the world’s best penetration testing software. Metasploit Framework Training works as a great foundation for cyber security professionals who aspire to work in the fields of penetration testing and Ethical Hacking. The course is popular amongst working professionals as well as students with beginner knowledge in the field as the demand for network security professionals is on the rise.

The Classroom course module has been designed in a way so that the penetration testers can learn vulnerability assessment and anticipating risks for their organisation’s cyber security. The students can learn from the skilled and experienced instructors in a real time environments.

Training Duration: 60 Hours

Pre-requisite: CISE Level 1

Training Module: Download Training Module.

Inquiry Form

  • Chapter 1 – Network Topology
  • Chapter 2 – Open Systems Interconnectivity Model
  • Chapter 3 – TCP/IP In-depth
  • Chapter 4 – WAP, NAT, DNS and ICMP
  • Chapter 5 – Internet Routing
  • Chapter 6 – Advanced Port Scanning
  • Chapter 7 – Sniffing Attacks
  • Chapter 8 – Masquerading Attacks
  • Chapter 9 – Advanced DOS and DDOS
  • Chapter 10 – Session Hijacking Attacks
  • Chapter 11 – Network Operations Center – Security
  • Chapter 12 – Network Traffic Analysis
  • Chapter 13 – Network Vulnerability Assessment
  • Chapter 14 – Network Penetration Testing
  • Chapter 15 – Intrusion Detection System
  • Chapter 16 – Snort 101
  • Chapter 17 – OSSEC 102
  • Chapter 18 – Intrusion Prevention System
  • Chapter 19 – Firewalls (Installation, Configuration and Usage)
  • Chapter 20 – OS Hardening for Networks – Linux and Windows
  • Chapter 21 – Cryptography – Introduction
  • Chapter 22 – Symmetric Key Encryption
  • Chapter 23 – Asymmetric Key Encryption
  • Chapter 24 – Hash functions
  • Chapter 25 – Trust models
  • Chapter 26 – VLAN – Security
  • Chapter 27 – VPN – Security
  • Chapter 28 – Wireless Networks – Introduction
  • Chapter 29 – Radio Frequency Essentials
  • Chapter 30 – Wireless Security – Basics
  • Chapter 31 – Wireless Threats
  • Chapter 32 – Attacking Wireless Hotspot and Security
  • Chapter 33 – WEP Security
  • Chapter 34 – WPA/WPA2 Security
  • Chapter 35 – Secure Wireless Infrastructure Deployment
  • Chapter 36 – DNS Tunneling
  • Chapter 37 – Network Forensic Methodology
  • Chapter 38 – Network Evidence Acquisition
  • Chapter 39 – OS Logs and Splunk
  • Chapter 40 – Summary

View More
 

Our Partner