Print Page   |   Contact Us   |   Sign In   |   Register
Pentesting with Metasploit (Hands-on Training)
View Registrations Tell a Friend About This EventTell a Friend
 

Pentesting with Metasploit (Hands-on Training) with Ryan Linn Presented by Raleigh ISSA & ECPI

3/8/2013
When: Friday, March 8th
Noon-5pm (lunch provided)
Where: ECPI
4101 Doie Cope Rd
Raleigh, North Carolina  27613
United States
Contact: David Vaughn

« Go to Upcoming Event List  

As of 2AM March 7th, this class is FULL, and is on waitlist. All confirmed attendees and waitlist registrations should have received an email from Education Director, David Vaughn.

Pentesting with Metasploit (Hands-on Training)
with Ryan Linn
Presented by Raleigh ISSA & ECPI

OVERVIEW: Metasploit is a penetration testing framework that allows users to leverage community built exploits and tools to perform security assessments against services. The Metasploitable virtual machine is an intentionally vulnerable virtual machine aimed at demonstrating many of Metasploit's features. Ryan Linn will be demonstrating how to approach the Metasploitable distribution navigate the Backtrack Linux distribution, map network hosts using Nmap, and finally assess and exploit services using Metasploit. This will not be a BYOD class, everything required for the course is being provided by ECPI College of Technology.

DATE: March 8th from 12pm to 5pm

COST: Free, but limited to 25 seats 

LOCATION:
ECPI College of Technology
4101 Doie Cope Rd
Raleigh, NC 27613

REGISTER: Please email education@raleighissa.org with "METASPLOIT CLASS” in the subject line

CONTACT: David Vaughn, Raleigh ISSA Education Director

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

1/24/2017
International Web Conference - 2016 Review and 2017 Predictions

2/9/2017
CISO Mentoring Webinar Series: What It Takes to be a CISO in 2017

2/11/2017 » 2/12/2017
ISSA CISO Executive Forum - Feb. 2017, San Francisco, CA

2/13/2017 » 2/17/2017
RSA® Conference 2017

2/13/2017
Women in Security SIG February 2017 Webinar




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information