SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Train from anywhere. Attend a live instructor-led course remotely or train on your time over 4 months.
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Leverage the Metasploit Framework to perform advanced, enterprise penetration testing, vulnerability assessments, and post-exploitation across modern networks and systems.
Wow! I thought I knew Metasploit, but SEC580 showed me just how powerful it can be! The techniques Jeff shared can truly become force multipliers on my next pen test engagement!
SEC580 empowers penetration testers and security professionals to harness the full capabilities of the Metasploit Framework for professional, enterprise-level assessments. Students will explore advanced exploitation, post-exploitation, and pivoting techniques, leveraging the power of Meterpreter, client-side attacks, and integration with tools like Empire, Cobalt Strike, and Living Off The Land binaries. In this Metasploit pentesting course, emphasis is placed on stealth, automation, antivirus evasion, and simulating real-world adversaries in enterprise environments. Through hands-on labs and realistic attack scenarios, this course helps participants extend beyond traditional usage of Metasploit and apply it in structured, effective, and compliant penetration testing methodologies.
Jeff McJunkin, Rogue Valley InfoSec founder, has led Fortune 100 pen tests and shaped Core NetWars. His key role in SANS Holiday Hack Challenge and hands-on security innovations continue to elevate the industry, advancing defenses worldwide.
Read more about Jeff McJunkinExplore the course syllabus below to view the full range of topics covered in SEC580: Metasploit for Enterprise Penetration Testing.
This first section provides foundational mastery of Metasploit Framework through hands-on exercises, covering Ruby foundations, exploitation techniques, Meterpreter capabilities, and domain compromise methods.
Section two focuses on advanced attack techniques, including client-side attacks, pivoting, and integration with other penetration testing tools to model sophisticated threat actors.
Assesses systems and networks to ensure compliance with policies and identify vulnerabilities in support of secure and resilient operations.
Explore learning pathApplication penetration testers probe the security integrity of a company’s applications and defenses by evaluating the attack surface of all in-scope vulnerable web-based services, clientside applications, servers-side processes, and more. Mimicking a malicious attacker, app pen testers work to bypass security barriers in order to gain access to sensitive information or enter a company’s internal systems through techniques such as pivoting or lateral movement.
Explore learning pathWe're updating our course schedule - please check back later.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources