Course Description
Advance your Vulnerability Management program by validating vulnerabilities through exploitation. Cybersecurity professionals attending this course will demonstrate the skills and knowledge necessary to:
- Architect, deploy, and scale Metasploit Pro in your environment
- Scope engagements by creating projects
- Discover vulnerable devices
- Gain access to assets using a toolkit of exploit utilities
- Take control of targets using a toolkit of session and asset highjacking utilities
- Collect evidence to support your summary of exploitable vulnerabilities
- Generate a report containing the results of your pentest
Virtual Instructor-Led Training Classes
- Our classrooms are designed to optimize the learner’s experience, and achieve the greatest outcomes for your Vulnerability Management and Security Testing program.
- Instructor-led sessions delivered via Zoom sessions allow learners to attend training from any location (with access to the internet)
- Practical lab environments made available during training enable an experiential learning experience; creates a safe place to learn
- Class size restricted to ensure each student receives the coaching they need to succeed
- Courses include one attempt to get certified by taking the Metasploit Pro Certified Specialist exam (additional attempts must be purchased separately)
Click here to view the Education Services training calendar