Please ensure Javascript is enabled for purposes of website accessibility

About This Course

Who this course is for:

  • This course is designed for anyone with a passion for Network Security. If you’re a Red Team member looking to exploit weaknesses and expose vulnerabilities for your clients or a Blue Teamer looking to protect your network perimeter or mitigate from insider threats these labs will help your understanding by using visual examples to prove methodology

What you’ll learn: 

  • Choose the right exploitation methods with 100% practical hands on examples of real life scenarios. Learn to use Metasploit and Powershell together to enhance your attack. Utilize ‘Pivoting’ techniques to route into internal networks from compromised perimeter nodes to gain further exploitation and keep your sessions alive with ‘persistence’. We will also explore ‘covering your tracks’ and evading Antivirus & IDS Systems
  • Be able to ‘hack’ into a system by understanding flaws and weaknesses in configurations using your logic and problem solving skills


  • Students are requested to have root access to a system with multiple Operating Systems to mirror exactly what the course describes to illustrate learning. Please make sure you have a 500GB HDD and create sufficient space on each Virtual Machine.
  • You need to have a passion for computing, with this you can go far. Without it, you will get bored.

Software version used in the course:

  • Metasploit and Powershell

This course has been designed to fill a hole in the market that no other course will give you with hands on step by step tutorials that this visual learning experience provides. This course allows you to follow, in real time, each stage of the engagement that you can tweak and train your skills from over and over again!

You will get the latest tools and techniques using Rapid 7’s Superb tool, ‘Metasploit’, to exploit targets as well as run post exploitation techniques and utilize PowerShell with ‘Empire’. The course will visually engage with ‘Empire’, a post exploitation tool, used to harness the power of Powershell to further exploit Microsoft Windows Operating systems where poor configurations and overlooked policy have been deployed.

The course will start with an understanding of how to move around Metasploit, basic keystrokes to get from one section of the framework to another, and together, we will exploit our first system, work out what we can and can’t do, how to keep it if something goes wrong, and how to leave the session without being tracked. We will learn how to not be seen by Intrusion Detection Systems and Evade Anti-Virus Software used by professional Penetration Testers around the globe.

The course will then look at Empire, again we will start with the basics of moving around, how to gain our sessions known as ‘agents’, escalate our privileges if required and migrate over to the Metasploit framework. This gives us the best of both worlds!

You will learn how to be professional in your methodology and help you to gain a foothold in the field.

I will teach you by visual learning and not simply speaking over presentations. Theory is good but this course will get you up and running with little to no knowledge at all. This is the course I really wish I had learning Penetration Testing as it answers the questions that are not a simple Google away.

Our Promise to You

By the end of this course, you will have the knowledge about penetration testing and ethical hacking.

30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.

Get started today and learn more about penetration testing and ethical hacking.

Course Curriculum

3h 6m

Section 1 - Metasploit
Navigation Around The Console, Shortcut Keys, Searching And Time Saving Key Tips 00:00:00
Understanding OS Finger Printing For Information Gathering Purposes 00:00:00
Understanding The famous MS08_067_netapi Exploit 00:00:00
Upgrading Command Shells To Meterpreter 00:00:00
Denial Of Service – MS12-020 MS Remote Desktop Use After Free 00:00:00
Exploitation – Web Script Delivery In PowerShell 00:00:00
Creating AutoRun Scripts For Fast Code Execution 00:00:00
Post Exploitation: Gathering Hashes – Cracking With JTR and OPHCRACK 00:00:00
Post Exploitation: Mimikatz Usage For Password Recovery 00:00:00
Post Exploitation: ‘Pass the Hash’ – (Update) What It Is And How To Use It 00:00:00
Post Exploitation: ‘Pivoting’ (Compromise Sessions Through Sessions!) 00:00:00
Post Exploitation – Using The ‘Ask’ Module 00:00:00
Persistence 00:00:00
Covering Your Tracks – Don’t Get Caught 00:00:00
Section 2 - Powershell Empire
Installation And Basic Setup 00:00:00
Navigation Around The Console, Shortcut Keys, Searching And Time Saving Key Tips 00:00:00
Creating Base64 Encoded Powershell Stagers 00:00:00
Creating A Component Scriptlet Stager To Create Shells! 00:00:00
Interacting With ‘Agents’ 00:00:00
Privilege Escalation: ‘Bypass UAC’ – 3 Different Methods! 00:00:00
Privilege Escalation – ‘Ask’ Module 00:00:00
Migrate To A ‘SYSTEM’ User And Try To Use Mimikatz! 00:00:00
Empire To Metasploit To Harvest Passwords 00:00:00
Template Design © VibeThemes. All rights reserved.

Setup Menus in Admin Panel



Enter your Name and Email for a chance to win Lifetime Access to all courses!
Promotion ends today.



Enter your Name and Email for a chance to win Lifetime Access to all courses!
Promotion ends today.

Success! You are now entered to win lifetime access to all courses. Winners are selected at the beginning of each month. 

P.S. Look out for our exclusive sales only shown to students on our email list!