skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Beginning Metasploit Preview this item
ClosePreview this item
Checking...

Beginning Metasploit

Author: Alexis Ahmed
Publisher: [Place of publication not identified] : Packt, [2018]
Edition/Format:   eVideo : Clipart/images/graphics : English
Summary:
"Metasploit is a popular penetration testing framework and has one of the largest exploit databases around. It is an essential tool in the penetration tester's arsenal. This course teaches you the practical implementation of Metasploit. Each section will get you started with Metasploit by enumerating available services, identifying potential weaknesses, and testing vulnerabilities through exploitation. The course  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Clipart/images/graphics, Internet resource, Videorecording
Document Type: Internet Resource, Computer File, Visual material
All Authors / Contributors: Alexis Ahmed
OCLC Number: 1078877999
Notes: Title from title screen (viewed December 11, 2018).
Date of publication from resource description page.
Performer(s): Presenter, Alexis Ahmed.
Description: 1 online resource (1 streaming video file (2 hr., 27 min., 26 sec.)) : digital, sound, color
Responsibility: Alexis Ahmed.

Abstract:

"Metasploit is a popular penetration testing framework and has one of the largest exploit databases around. It is an essential tool in the penetration tester's arsenal. This course teaches you the practical implementation of Metasploit. Each section will get you started with Metasploit by enumerating available services, identifying potential weaknesses, and testing vulnerabilities through exploitation. The course will show you how to correctly configure Metasploit and how to troubleshoot potential errors. You will scan the different services to identify vulnerabilities. Finally, you will explore sophisticated, real-world scenarios where performing penetration tests is a challenge. By the end of this course, you will be able to use Metasploit to quickly assess the security structure of systems and networks to reduce risk."--Resource description page.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1078877999<\/a>> # Beginning Metasploit<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:VideoObject<\/a>, schema:Movie<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1078877999<\/span>\" ;\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Unknown \'gen\' value: cig<\/span>\" ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5694899226#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5694899226#CreativeWork\/metasploit_electronic_resource<\/a>> ; # Metasploit (Electronic resource)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5694899226#Topic\/penetration_testing_computer_security<\/a>> ; # Penetration testing (Computer security)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5694899226#Topic\/computers_access_control<\/a>> ; # Computers--Access control<\/span>\n\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5694899226#Person\/ahmed_alexis<\/a>> ; # Alexis Ahmed<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2018<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"\"Metasploit is a popular penetration testing framework and has one of the largest exploit databases around. It is an essential tool in the penetration tester\'s arsenal. This course teaches you the practical implementation of Metasploit. Each section will get you started with Metasploit by enumerating available services, identifying potential weaknesses, and testing vulnerabilities through exploitation. The course will show you how to correctly configure Metasploit and how to troubleshoot potential errors. You will scan the different services to identify vulnerabilities. Finally, you will explore sophisticated, real-world scenarios where performing penetration tests is a challenge. By the end of this course, you will be able to use Metasploit to quickly assess the security structure of systems and networks to reduce risk.\"--Resource description page.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/5694899226<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Beginning Metasploit<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1078877999<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/ezproxy.torontopubliclibrary.ca\/login?url=http:\/\/proquestcombo.safaribooksonline.com\/?uiCode=torontopl&xmlId=9781789347555<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/proquest.safaribooksonline.com\/?fpi=9781789347555<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1078877999<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5694899226#CreativeWork\/metasploit_electronic_resource<\/a>> # Metasploit (Electronic resource)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Metasploit (Electronic resource)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5694899226#Person\/ahmed_alexis<\/a>> # Alexis Ahmed<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Ahmed<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Alexis<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Alexis Ahmed<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5694899226#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5694899226#Topic\/computers_access_control<\/a>> # Computers--Access control<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computers--Access control<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5694899226#Topic\/penetration_testing_computer_security<\/a>> # Penetration testing (Computer security)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Penetration testing (Computer security)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/ezproxy.torontopubliclibrary.ca\/login?url=http:\/\/proquestcombo.safaribooksonline.com\/?uiCode=torontopl&xmlId=9781789347555<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Connect to this resource online<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n