Awesome post in ethicalhacker.net with more than 300 minutes of video tutorials. I point to the original resources instead of using the url shortening service that appears in the post.

1. Metasploit Megaprimer (Exploitation Basics and need for Metasploit) Part 1

http://securitytube.net/Metasploit-Megaprimer-(Exploitation-Basics-and-need-for-Metasploit)-Part-1-video.aspx

2. Metasploit Megaprimer (Getting Started with Metasploit) Part 2

http://securitytube.net/Metasploit-Megaprimer-(Getting-Started-with-Metasploit)-Part-2-video.aspx

3. Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi)

http://securitytube.net/Metasploit-Megaprimer-Part-3-(Meterpreter-Basics-and-using-Stdapi)-video.aspx

4. Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv)

http://securitytube.net/Metasploit-Megaprimer-Part-4-(Meterpreter-Extensions-Stdapi-and-Priv)-video.aspx

5. Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito)

http://securitytube.net/Metasploit-Megaprimer-Part-5-(Understanding-Windows-Tokens-and-Meterpreter-Incognito)-video.aspx

6. Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts)

http://securitytube.net/Metasploit-Megaprimer-Part-6-(Espia-and-Sniffer-Extensions-with-Meterpreter-Scripts)-video.aspx

7. Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation)

http://securitytube.net/Metasploit-Megaprimer-Part-6-(Espia-and-Sniffer-Extensions-with-Meterpreter-Scripts)-video.aspx

8. Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu)

http://securitytube.net/Metasploit-Megaprimer-Part-8-(Post-Exploitation-Kung-Fu)-video.aspx

9. Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation)

http://securitytube.net/Metasploit-Megaprimer-Part-9-(Post-Exploitation-Privilege-Escalation)-video.aspx

10. Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing)

http://securitytube.net/Metasploit-Megaprimer-Part-10-(Post-Exploitation-Log-Deletion-and-AV-Killing)-video.aspx

11. Metasploit Megaprimer (Post Exploitation and Stealing Data) Part 11

http://securitytube.net/Metasploit-Megaprimer-(Post-Exploitation-and-Stealing-Data)-Part-11-video.aspx

12. Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits)

http://securitytube.net/Metasploit-Megaprimer-Part-12-(Post-Exploitation-Backdoors-and-Rootkits)-video.aspx

13. Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding)

http://securitytube.net/Metasploit-Megaprimer-Part-13-(Post-Exploitation-Pivoting-and-Port-Forwarding)-video.aspx

14. Metasploit Megaprimer Part 14 (Backdooring Executables)

http://securitytube.net/Metasploit-Megaprimer-Part-14-(Backdooring-Executables)-video.aspx

15. Metasploit Megaprimer Part 15 (Auxiliary Modules)

http://securitytube.net/Metasploit-Megaprimer-Part-15-(Auxiliary-Modules)-video.aspx

16. Metasploit Megaprimer Part 16 (Pass the Hash Attack)

http://securitytube.net/Metasploit-Megaprimer-Part-16-(Pass-the-Hash-Attack)-video.aspx