Name Size Parent Directory - 6. Maintaining and expanding metasploit/ - 5. Gaining access to systems/ - 4. Scanning the network/ - 3. Installing and configuring metasploit/ - 2. Introducing metasploit for pentesting/ - 1. Course overview/ -