Exploitation

Exploit your target’s available attack vectors and get access to the remove system and/or its data.

  • Duration 2 weeks
  • Weekly study 10 hours

Learn to understand and exploit vulnerabilities of remote targets.

In this short course, we will begin the exploitation of the vulnerabilities we have identified and penetrate our targets. Once we have gained access to the target machine, we will look into escalating our privileges and/or moving onto high value targets.

What topics will you cover?

  • Exploitation
  • Metasploit
  • Penetration
  • Priv escalation
  • Moving laterally
  • Exfiltration

What will you achieve?

By the end of the course, you'll be able to...

  • Explore remote shells and how we connect to target computers
  • Investigate the Metasploit framework
  • Demonstrate knowledge of payloads such as meterpreter shell
  • Assess vulnerabilities of remote systems
  • Perform data exfiltration from the target network

Who is the course for?

The course is for MSc Cyber Security students.

Please note that the individuals detailed in the ‘Who will you learn with?’ section below, are current staff members and may be subject to change.

What software or tools do you need?

Kali Linux and a web browser.

Who will you learn with?

Christo Panchev

Christo Panchev

Dr. Christo Panchev is a Senior Lecturer in Cyber Security at Coventry University with more than 20 years experience in industry and higher education, research and teaching in A.I. and Cyber Security.

Daniel Goldsmith

Daniel Goldsmith

Dr Dan Goldsmith is a Senior Lecturer in the Institute of Coding at Coventry University.
He teaches on the Ethical Hacking course, and his interests include Reverse Engineering, PenTesting and the IOT.

Who developed the course?

Coventry University

Coventry secured gold in the UK Government’s 2017 Teaching Excellence Framework (TEF) and is University of the Year for Student Experience in The Times & The Sunday Times Good University Guide 2019.