Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

SEC580: Metasploit for Enterprise Penetration Testing

SEC580Offensive Operations
  • 12 Hours (Self-Paced)
Course created by:
Jeff McJunkin
Jeff McJunkin
SEC580: Metasploit for Enterprise Penetration Testing
Course created by:
Jeff McJunkin
Jeff McJunkin
  • 12 CPEs

    Apply your credits to renew your certifications

  • Virtual Live Instruction or Self-Paced

    Train from anywhere. Attend a live instructor-led course remotely or train on your time over 4 months.

  • Intermediate Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 10 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Leverage the Metasploit Framework to perform advanced, enterprise penetration testing, vulnerability assessments, and post-exploitation across modern networks and systems.

Course Overview

SEC580 empowers penetration testers and security professionals to harness the full capabilities of the Metasploit Framework for professional, enterprise-level assessments. Students will explore advanced exploitation, post-exploitation, and pivoting techniques, leveraging the power of Meterpreter, client-side attacks, and integration with tools like Empire, Cobalt Strike, and Living Off The Land binaries. In this Metasploit pentesting course, emphasis is placed on stealth, automation, antivirus evasion, and simulating real-world adversaries in enterprise environments. Through hands-on labs and realistic attack scenarios, this course helps participants extend beyond traditional usage of Metasploit and apply it in structured, effective, and compliant penetration testing methodologies.

What You’ll Learn

  • Execute advanced Metasploit exploitation techniques
  • Perform post-exploitation reconnaissance and pivoting
  • Master Meterpreter's extensive feature set
  • Deploy stealthy anti-virus evasion methods
  • Conduct effective spear-phishing campaigns

Business Takeaways

  • Reduce costs with professional-grade open-source tools
  • Meet regulatory compliance requirements efficiently
  • Enhance vulnerability assessment capabilities
  • Improve security testing methodology
  • Strengthen enterprise security posture

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC580: Metasploit for Enterprise Penetration Testing.

Section 1Metasploit for Enterprise Penetration Testing - Part I

This first section provides foundational mastery of Metasploit Framework through hands-on exercises, covering Ruby foundations, exploitation techniques, Meterpreter capabilities, and domain compromise methods.

Topics covered

  • Metasploit Architecture
  • Msfconsole Interface
  • Testing Methodology
  • Automation Scripts
  • PowerShell Integration

Labs

  • Implementing Msfconsole logging
  • Executing Meterpreter scripts
  • Performing AV bypass techniques
  • Conducting client-side attacks
  • Integrating with scanning tools

Section 2Metasploit for Enterprise Penetration Testing - Part 2

Section two focuses on advanced attack techniques, including client-side attacks, pivoting, and integration with other penetration testing tools to model sophisticated threat actors.

Topics covered

  • Advanced Pivoting
  • Privilege Escalation
  • Windows Payload Management
  • Data Exfiltration
  • Tool Integration

Labs

  • Implementing pivoting techniques
  • Setting up SOCKS proxies
  • Executing privilege escalation
  • Customizing Meterpreter scripts
  • Deploying persistence mechanisms

Things You Need To Know

Relevant Job Roles

Vulnerability Assessment Analyst (DCWF 541)

DoD 8140: Cybersecurity

Assesses systems and networks to ensure compliance with policies and identify vulnerabilities in support of secure and resilient operations.

Explore learning path

Application Pen Tester

Offensive Operations

Application penetration testers probe the security integrity of a company’s applications and defenses by evaluating the attack surface of all in-scope vulnerable web-based services, clientside applications, servers-side processes, and more. Mimicking a malicious attacker, app pen testers work to bypass security barriers in order to gain access to sensitive information or enter a company’s internal systems through techniques such as pivoting or lateral movement.

Explore learning path

We're updating our course schedule - please check back later.

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources