Metasploit.
1. Acquiring Metasploit. (0:00)
2. Setting Up Metasploit. (2:32)
3. Metasploit Web Interface. (4:33)
4. Configuring Workspaces. (7:59)
5. Running Nmap from Metasploit. (10:43)
6. Importing Nessus Results. (14:17)
7. Scanning with Metasploit. (17:00)
8. Looking at Vulnerabilities. (20:51)
9. Searching for Vulnerabilities. (23:40)
10. Running Exploits. (25:48)
11. Post Exploitation Data Gathering. (28:22)
12. Pivoting & Tunneling. (32:30)
13. Writing an MSF Plugin. (35:48)
14. Writing Fuzzers. (42:00)
15. Social Engineering Toolkit. (48:17)
16. Spear Phishing. (50:23)

This Advanced Ethical Hacking course will provide direction on tools and techniques for performing ethical hacking. Author will cover Nessus, Nexpose, Nmap, and Metasploit, as well as manual testing techniques. FT will also demonstrate Web Application Testing and various tools that will assist in that effort.

source