gm@ictd-lb.com
00961 70 414 418
Register Now
Anatomy of a Cyber Attack: Beginner Hacking with Metasploit!

Learn the attacker’s methodology and start your career in cybersecurity, penetration testing, and ethical hacking!
What Will I Learn?

    Understand the steps of a cyber attack

    Understand the basic methodology, tools, and techniques used by hackers in exploiting networks and information systems

Requirements

    PC or Mac with at least 4 GB of RAM in order to install the virtualization software used in this course
    Windows XP disc or disc image to setup a vulnerable machine for the labs
    Kali Linux disc image (free to download, instructions provided in the course)
    VirtualBox software (free to download, instructions provided in the course)