In this lecture you will learn how to install a vulnerable operating system (Metasploitable) as a virtual machine so we can use it to practice penetration testing in future lectures. This video is taken from one of my full courses on ethical hacking, check out the following links for more info and to get massive discounts on them: Learn Ethical Hacking / Penetration Testing From Scratch https://www.udemy.com/learn-ethical-hacking-from-scratch/?couponCode=YOUTUBE-G-49 Learn Website Hacking / Penetration Testing From Scrtach https://www.udemy.com/learn-website-hacking-penetration-testing-from-scratch/?couponCode=YOUTUBE-W-49 Learn Network Hacking / Penetration Testing From Scratch https://www.udemy.com/wifi-hacking-penetration-testing-from-scratch/?couponCode=YOUTUBE-N-35 Learn Hacking / Penetration Testing Using Android https://www.udemy.com/learn-hackingpenetration-testing-using-android-from-scratch/?couponCode=YOUTUBE-35-A Learn Wi-Fi Password Penetration Testing From Scratch https://www.udemy.com/learn-cracking-wi-fi-passwordskeys-wepwpawpa2/?couponCode=YOUTUBE10 ARP Spoofing Attacks - Execution & Detection https://www.udemy.com/learn-practical-attacks-against-network-clients/?couponCode=YOUTUBE9