Metasploit Framework, Pen Testing Methodology & Malware Triage
Penetration Testing Methodology was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used by penetration testers. This course teaches students concepts and methods involved in targeting, infiltrating and expanding access within networks. The course allows students to understand the attacker mindset and learn how to simulate a real-world attacker’s thoughts and actions, all for the purpose of helping to improve the security posture of the organizations they support.
Students attending the course should have a strong understanding of how data traverses a network, basic UNIX and Windows competency, and comfort working from the command line. Additionally, understanding of information assurance principles and penetration testing methodology are strongly recommended.
Included in this course is an additional module focusing specifically on the Metasploit Framework, which provide students with an introduction to an exploitation framework or suite of penetration testing tools commonly used by penetration testers. This module provides students with an in-depth overview of the capabilities and contents of the Metasploit Framework and covers how to install it, maneuver within its modules/menus, and maintain it.
Additionally, students will complete the Malware Analysis (Triage) module which provides students with a comprehensive hands-on exposure to the processes, tools and procedures used to identify common types of malware and to quickly determine their capabilities and threat level. This course teaches students concepts and methods involved in finding, analyzing and characterizing malware to determine how severe of a threat it may pose within a system or network.
This course includes significant amounts of hands-on practical application of skills learned. Students are introduced to topics and concepts through lectures then given a series of lab exercises to reinforce that learning and build skill. Students must exercise the penetration testing methodology, process and analyze collected data, triage malware and develop the necessary tradecraft and stealth in order to successfully complete the goals of the course.
- What is the Metasploit Framework (MSF)
- MSF Installation and Set Up
- Overview of Tools and Capabilities
- Navigation within MSF Menus
- Penetration Testing Terminology
- Updating MSF
- Documentation and Additional Information
- Open source information gathering
- Legal issues of penetration testing
- Sources of interesting information
- Footprinting, scanning and enumeration
- Vulnerability information
- Exploiting hosts/devices
- Situational Awareness
- Log manipulation
- Pivoting and redirection
- Data exfiltration
- Trusted networks
- Passwords, reuse and cracking
- Public-facing networks vs. intranets
- Keyloggers and sniffers
- Malware Overview
- Introductory Malware Identification
- Process List Analysis
- Suspicious Processes
- Netstat, Open Port and Connection Analysis
- Handles to Files and Other Resources
- Suspicious .dlls and Drivers
- Common Persistence Techniques
- Rootkit Detection
- Determining Network Awareness
- Determining Other Capabilities (hiding, keyboard logging, taking screenshots)
- Code Analysis Triage (Hex Editor)
- Online Malware Capability & Signature Research
Is there a discount available for current students?
UMBC students and alumni, as well as students who have previously taken a public training course with UMBC Training Centers are eligible for a 10% discount, capped at $250. Please provide a copy of your UMBC student ID or an unofficial transcript or the name of the UMBC Training Centers course you have completed. Asynchronous courses are excluded from this offer.
What is the cancellation and refund policy?
Student will receive a refund of paid registration fees only if UMBC Training Centers receives a notice of cancellation at least 10 business days prior to the class start date for classes or the exam date for exams.