This course is designed to cover Metasploit from the ground up. Note there is some overlap between this course and the general hacking course that we offer. The general hacking will do some limited Kali and Metasploit.
Introduction to Linux (optional)
Linux file structure and directories
Linux shall commands
Ls, cd, ps, pstree, top, touch, grep, mkdir, apt-get, cat, dmesg, find,
Introduction to Kali
Setting up Kali
John the ripper
Basic Metasploit commands
Metasploit scans (SSH, FTP, SMB, DNS, SQL Server, nmap)
Basic attacks (this begins with easy attacks that are very likely to work, and are against easy targets)
At least 8 different attacks against less secure Windows variants are explored.
In depth discussion of why these attacks work and how they work
How to find exploits
More with Metasploit
Leaning to use msfvenom
Attacking more secure Windows variants (i.e. patched and firewalled)
Attacking Linux boxes
Anti-virus avoidance techniques
Firewill evasion techniques
Moving through a router
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.