Metasploit

Metasploit is a powerful and widely-used cybersecurity framework for penetration testing and vulnerability assessment in information technology environments. Coursera's Metasploit catalogue teaches you the core functionalities of this essential tool, including exploitation techniques, penetration testing methodologies, and the intricacies of the Metasploit Framework. You'll learn to set up and configure Metasploit, identify and exploit vulnerabilities, perform network and system attacks, and execute post-exploitation tactics such as persistence techniques and attack simulations. This skill empowers cybersecurity professionals to conduct advanced penetration tests, understand attacker methodologies, and implement effective countermeasures, making it invaluable for ethical hacking, red teaming, and overall system security enhancement in today's digital landscape.
7credentials
14courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Get in-depth knowledge of a subject by completing a series of courses and projects.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "metasploit"

  • Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation

  • Status: Free Trial

    Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, General Networking, Scripting Languages, Cyber Security Assessment, Python Programming, Web Applications, Cybersecurity, Data Ethics, Firewall, Network Security, Computer Networking

  • Status: Preview

    Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Linux Commands, Command-Line Interface, Virtual Machines

  • Status: Free Trial

    Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Command-Line Interface, Software Installation, Virtual Machines, SQL

  • Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Security Testing, Cybersecurity, Virtual Machines, Technical Writing, Web Servers, Linux

  • Status: Preview

    Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment

What brings you to Coursera today?

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Exploit development, Security Strategy, Threat Modeling, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection

  • Status: New
    Status: Free Trial

    Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Security Testing, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Cryptography, Cybersecurity, Vulnerability Scanning, Hardening, Threat Detection, Data Import/Export, Public Key Infrastructure, MySQL, Linux, Linux Administration

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Metasploit, Safety Culture, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Security Assessment, Cybersecurity, Threat Detection, Generative AI, Security Testing, Vulnerability Scanning, Anomaly Detection, Data Security, Security Strategy, Network Security, Security Software, Change Management, Machine Learning Methods, Ethical Standards And Conduct, Data Visualization

  • Status: Free Trial

    Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Metasploit, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Security Assessment, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Microsoft Windows

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • EDUCBA
  • Johns Hopkins University
  • LearnQuest
  • University of Colorado System