skip to content
Learning Metasploit Preview this item
ClosePreview this item
Checking...

Learning Metasploit

Author: Sagar Rahalkar
Publisher: [Place of publication not identified] : Packt Publishing, 2017.
Edition/Format:   eVideo : Clipart/images/graphics : English
Summary:
"This course will begin by introducing you to Metasploit and its functionality. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment ... You will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools ... You'll get hands-on experience carrying out client-side attacks ... you'll learn  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Clipart/images/graphics, Internet resource, Videorecording
Document Type: Internet Resource, Computer File, Visual material
All Authors / Contributors: Sagar Rahalkar
OCLC Number: 1007702241
Notes: Title from resource description page (Safari, viewed October 24, 2017).
Description: 1 online resource (1 streaming video file (2 hr., 17 min., 29 sec.)) : digital, sound, color
Responsibility: Sagar Rahalkar.

Abstract:

"This course will begin by introducing you to Metasploit and its functionality. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment ... You will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools ... You'll get hands-on experience carrying out client-side attacks ... you'll learn about web application security scanning and bypassing anti-virus and clearing traces on the target system post-compromise. This video will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit."--Resource description page.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1007702241> # Learning Metasploit
    a schema:CreativeWork, schema:VideoObject, schema:Movie ;
    library:oclcnum "1007702241" ;
    rdfs:comment "Unknown 'gen' value: cig" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4559559002#CreativeWork/metasploit_electronic_resource> ; # Metasploit (Electronic resource)
    schema:about <http://experiment.worldcat.org/entity/work/data/4559559002#Topic/penetration_testing_computer_security> ; # Penetration testing (Computer security)
    schema:about <http://experiment.worldcat.org/entity/work/data/4559559002#Topic/computers_access_control> ; # Computers--Access control
    schema:about <http://experiment.worldcat.org/entity/work/data/4559559002#Topic/computer_security> ; # Computer security
    schema:author <http://experiment.worldcat.org/entity/work/data/4559559002#Person/rahalkar_sagar> ; # Sagar Rahalkar
    schema:datePublished "2017" ;
    schema:description ""This course will begin by introducing you to Metasploit and its functionality. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment ... You will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools ... You'll get hands-on experience carrying out client-side attacks ... you'll learn about web application security scanning and bypassing anti-virus and clearing traces on the target system post-compromise. This video will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit."--Resource description page."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4559559002> ;
    schema:inLanguage "en" ;
    schema:name "Learning Metasploit"@en ;
    schema:productID "1007702241" ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9781788628396> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1007702241> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4559559002#CreativeWork/metasploit_electronic_resource> # Metasploit (Electronic resource)
    a schema:CreativeWork ;
    schema:name "Metasploit (Electronic resource)" ;
    .

<http://experiment.worldcat.org/entity/work/data/4559559002#Person/rahalkar_sagar> # Sagar Rahalkar
    a schema:Person ;
    schema:familyName "Rahalkar" ;
    schema:givenName "Sagar" ;
    schema:name "Sagar Rahalkar" ;
    .

<http://experiment.worldcat.org/entity/work/data/4559559002#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4559559002#Topic/computers_access_control> # Computers--Access control
    a schema:Intangible ;
    schema:name "Computers--Access control"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4559559002#Topic/penetration_testing_computer_security> # Penetration testing (Computer security)
    a schema:Intangible ;
    schema:name "Penetration testing (Computer security)"@en ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.