Metasploit is one of the best-known and most used cybersecurity technologies for penetration testing (Cyber Security News). This short course gives you the job-ready skills in exploitation techniques and penetration testing using Metasploit employers are looking for.



Exploitation and Penetration Testing with Metasploit
This course is part of IBM Ethical Hacking with Open Source Tools Professional Certificate


Instructors: IBM Skills Network Team
Access provided by Universiti Brunei Darussalam
2,034 already enrolled
(13 reviews)
Recommended experience
What you'll learn
- Build job-ready skills using the Metasploit framework, its architecture, and capabilities, to effectively support penetration testing activities. 
- Perform reconnaissance, vulnerability assessment, exploit execution, and post-exploitation tasks using Metasploit. 
- Develop, modify, and execute exploits for real-world attack scenarios, including network, web application, and social engineering. 
- Document penetration testing findings, generate actionable reports, and provide recommendations for security improvements. 
Skills you'll gain
Details to know

Add to your LinkedIn profile
14 assignments
June 2025
See how employees at top companies are mastering in-demand skills

Build your Security expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate from IBM

There are 5 modules in this course
In this module, you'll be introduced to the Metasploit Framework, covering its installation, interface, and the foundational concepts of exploitation. You'll learn how to set up Metasploit, identify key components like payloads and sessions, and perform basic exploitation tasks in a safe environment.
What's included
6 videos5 readings3 assignments7 plugins
In this module, you'll build on your foundational knowledge as you explore auxiliary modules, session handling, and the basics of exploit development. You'll simulate attacks, modify existing exploits, and apply fuzzing techniques to discover vulnerabilities, bridging theory with real-world offensive security tasks.
What's included
3 videos2 readings3 assignments7 plugins
In this module, you will explore techniques attackers use after compromising a system, including privilege escalation, persistence mechanisms, evasion techniques, and network attack simulations.
What's included
6 videos3 readings4 assignments6 plugins
In this module, you'll explore exploitation techniques that target web applications and human vulnerabilities. You'll learn how attackers compromise web apps, use phishing, and perform physical and USB-based attacks.
What's included
6 videos3 readings4 assignments5 plugins
This module serves as the capstone for the course, where learners will apply all acquired skills to conduct a comprehensive penetration test using Metasploit.
What's included
1 video2 readings1 app item3 plugins
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Offered by
Why people choose Coursera for their career




Explore more from Information Technology
 - Coursera Instructor Network 




