SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsApply your credits to renew your certifications
Train from anywhere. Attend a live instructor-led course remotely or train on your time over 4 months.
Apply what you learn with hands-on exercises and labs
Leverage the Metasploit Framework to perform advanced, enterprise penetration testing, vulnerability assessments, and post-exploitation across modern networks and systems.
Wow! I thought I knew Metasploit, but SEC580 showed me just how powerful it can be! The techniques Jeff shared can truly become force multipliers on my next pen test engagement!
SEC580 empowers penetration testers and security professionals to harness the full capabilities of the Metasploit Framework for professional, enterprise-level assessments. Students will explore advanced exploitation, post-exploitation, and pivoting techniques, leveraging the power of Meterpreter, client-side attacks, and integration with tools like Empire, Cobalt Strike, and Living Off The Land binaries. In this Metasploit pentesting course, emphasis is placed on stealth, automation, antivirus evasion, and simulating real-world adversaries in enterprise environments. Through hands-on labs and realistic attack scenarios, this course helps participants extend beyond traditional usage of Metasploit and apply it in structured, effective, and compliant penetration testing methodologies.
Jeff McJunkin, Rogue Valley InfoSec founder, has led Fortune 100 pen tests and shaped Core NetWars. His key role in SANS Holiday Hack Challenge and hands-on security innovations continue to elevate the industry, advancing defenses worldwide.
Read more about Jeff McJunkinExplore the course syllabus below to view the full range of topics covered in SEC580: Metasploit for Enterprise Penetration Testing.
This first section provides foundational mastery of Metasploit Framework through hands-on exercises, covering Ruby foundations, exploitation techniques, Meterpreter capabilities, and domain compromise methods.
Section two focuses on advanced attack techniques, including client-side attacks, pivoting, and integration with other penetration testing tools to model sophisticated threat actors.
Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.
Explore learning pathApplication penetration testers probe the security integrity of a company’s applications and defenses by evaluating the attack surface of all in-scope vulnerable web-based services, clientside applications, servers-side processes, and more. Mimicking a malicious attacker, app pen testers work to bypass security barriers in order to gain access to sensitive information or enter a company’s internal systems through techniques such as pivoting or lateral movement.
Explore learning pathWhen purchasing a live, instructor-led course, add 4 months of online access. View price in the info icons below.
Add 6 months of hands-on skills practice. Add to your cart when purchasing your course.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources