loading......

Where do you need ?

location

Please select a Location.

Enquire

Submit your enquiry for Metasploit

Please enter valid question or comment

Please select a category

Please enter your name.

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Mega Cyber Lab

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer

Share

Metasploit

Metasploit

Online Instructor led Course

Platform: Video conferencing

1,500

No Reviews Yet
0 Interested

About the Course


Megacyberlab- Hands on Workshop on Metasploit which may help you to
- How to use Metasploit.
- Find the Vulnerabilty using Metasploit.
- How to import other exploit.

Topics Covered

- Introduction to Metasploit.
- Installing Metasploit and usage.
- Details usage of Metasploit.
- Importing Reports and exploits.

Who should attend

- College students seeking career in Cyber Forensics Industry.
- Person having interest in Hacking & Security.
- Education Faculty & Staff.
- IT Professionals, Web Developers, Network Engineers.
- Students from any branch can attend the workshop.

Pre-requisites

- Passion to learn new creative things.
- Knowledge of how to use Computer.
- Having basic knowledge of Web & Internet.

What you need to bring

-Laptop if possible

Key Takeaways

A self contained bootable, portable usb pen drive which will help to practice Ethical hacking, IT security , Networking security, IT Audit, System Audit, etcs.
Which is based on open source using " Back track at extra cost Rs 900.00
Tools :
1. Linux based OS : Back track 4.0 /5.3
2.Metasploit
3,Namap
4.Nessus
5. Virtual box and many many more.
Gallery
Reviews
There are no Reviews yet. Be the First to Review
Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

Comment ?

Questions Guidelines

  • Start your question with simple statements like "what", "when", "where", or "how".
  • Ensure your question or answer is not offensive or insensitive - it may be voted down or banned.
  • Please provide as much detail as possible as this will allow our members to better understand and respond to your question.
  • Take some time to categorize your question. This will greatly help other users find the question.


You can add upto 6 Images

Ask


There are no Reviews yet. Be the First to Review

Date and Time

Not decided yet.

About the Trainer

Tarun Shrivastava

BE Computer Science


Certified Ethical hacker , Penetration tester, Vulnerability assessment, Network security profesional
Seats Left-

Students Interested 0

Course Id: 6718