Talk With an Expert

SEC580: Metasploit for Enterprise Penetration Testing

SEC580Offensive Operations
  • 12 Hours (Self-Paced)
Course created by:
Jeff McJunkin
Jeff McJunkin
SEC580: Metasploit for Enterprise Penetration Testing
Course created by:
Jeff McJunkin
Jeff McJunkin
  • 12 CPEs

    Apply your credits to renew your certifications

  • Virtual Live Instruction or Self-Paced

    Train from anywhere. Attend a live instructor-led course remotely or train on your time over 4 months.

  • 10 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Leverage the Metasploit Framework to perform advanced, enterprise penetration testing, vulnerability assessments, and post-exploitation across modern networks and systems.

Course Overview

SEC580 empowers penetration testers and security professionals to harness the full capabilities of the Metasploit Framework for professional, enterprise-level assessments. Students will explore advanced exploitation, post-exploitation, and pivoting techniques, leveraging the power of Meterpreter, client-side attacks, and integration with tools like Empire, Cobalt Strike, and Living Off The Land binaries. In this Metasploit pentesting course, emphasis is placed on stealth, automation, antivirus evasion, and simulating real-world adversaries in enterprise environments. Through hands-on labs and realistic attack scenarios, this course helps participants extend beyond traditional usage of Metasploit and apply it in structured, effective, and compliant penetration testing methodologies.

What You’ll Learn

  • Execute advanced Metasploit exploitation techniques
  • Perform post-exploitation reconnaissance and pivoting
  • Master Meterpreter's extensive feature set
  • Deploy stealthy anti-virus evasion methods
  • Conduct effective spear-phishing campaigns

Business Takeaways

  • Reduce costs with professional-grade open-source tools
  • Meet regulatory compliance requirements efficiently
  • Enhance vulnerability assessment capabilities
  • Improve security testing methodology
  • Strengthen enterprise security posture

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC580: Metasploit for Enterprise Penetration Testing.

Section 1Metasploit for Enterprise Penetration Testing - Part I

This first section provides foundational mastery of Metasploit Framework through hands-on exercises, covering Ruby foundations, exploitation techniques, Meterpreter capabilities, and domain compromise methods.

Topics covered

  • Metasploit Architecture
  • Msfconsole Interface
  • Testing Methodology
  • Automation Scripts
  • PowerShell Integration

Labs

  • Implementing Msfconsole logging
  • Executing Meterpreter scripts
  • Performing AV bypass techniques
  • Conducting client-side attacks
  • Integrating with scanning tools

Section 2Metasploit for Enterprise Penetration Testing - Part 2

Section two focuses on advanced attack techniques, including client-side attacks, pivoting, and integration with other penetration testing tools to model sophisticated threat actors.

Topics covered

  • Advanced Pivoting
  • Privilege Escalation
  • Windows Payload Management
  • Data Exfiltration
  • Tool Integration

Labs

  • Implementing pivoting techniques
  • Setting up SOCKS proxies
  • Executing privilege escalation
  • Customizing Meterpreter scripts
  • Deploying persistence mechanisms

Things You Need To Know

Course Schedule & Pricing

Looking for Group Purchasing Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Jeff McJunkin
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $3,505 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Virtual (live)

    Instructed by Jeff McJunkin
    Date & Time
    Fetching schedule..View event details
    Course price
    $3,505 USD*Prices exclude applicable local taxes
    Registration Options
Showing 2 of 2

Benefits of Learning with SANS

Instructor teaching to a class

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Resources

Get access to our range of industry-leading courses and resources