You are on page 1of 1

Rapid7 Corporate Headquarters 800 Boylston Street, Prudential Tower, 29th Floor, Boston, MA 02199-8095 617.247.1717 www.rapid7.

com
Metasploit 201: The Journeyman's Guide to Network Pwning
The art of penetration testing starts with repetition and practicethe only way to determine what processes work for you
is try, try again: You need to build up your familiarity and comfort level, and hopefully after some attempts, youll stack
up success. In this two-day interactive class, one of Rapid7s penetration testing experts will walk you through advanced
features and techniques for network penetration testing with Metasploit Pro and CLI.
The class culminates in several Capture the Flag exercises, where you can apply what youve learned in a fun and
educational simulation against multiple scenario-driven target environments. (Customers who participate in Training on-
site will have hands-on opportunities to apply skills theyve learned in simulations in their own environment.)
WHO SHOULD ATTEND:
This class is geared toward security professionals who are already comfortable with Metasploit Pro/Express and penetration
testing techniques. Youll get the most out of this training session if youre responsible for penetration testing, systems
security, or information security at your organization.
WHAT YOU WILL LEARN:
Penetration Testing Methodology Refresher Attendees will get a refresher on penetration testing methodology and
process: Discover, Gain Access, Take Control, Collect Evidence.
The CLI MSFConsole, MSFEncode and MSFPayload Attendees will learn about the command line features of the
Metasploit Framework and how it interacts with Metasploit Pro/Express.
Advanced Techniques In a sprint fashion, we will dive into time-boxed activities on the following techniques: Post
Exploitation, Macros, Abusing Trusts, Privilege Escalation, Furthering Access, Evasion and Pivoting.
Scenario X During this portion of the course, well put your skills to the test in common scenarios to facilitate the
growth of your own pen testing process.

PREREQUISITES:
Ideally, you should have some experience with the following:
Experience with Windows and Linux Operating Systems
Basic knowledge of network protocols
Comfortable with Linux CLI (bash)
Vulnerability management system knowledge
Penetration testing knowledge
Prior experience using Metasploit

You might also like