First of all, welcome to 0x00sec, I’m glad you’re enjoying your stay so far.
Now, if you’re still completely new to ethical hacking I would suggest you to go document yourself on a few preparatory topics such as port forwarding (and networking as a whole), it’s a very easy task that most of the times can be done by tweaking your router settings from its control panel, but there are alternatives. My suggestion is that if you’re struggling to do these steps you should come back to hacking in a little while, once you have the basics down, so you’ll understand much better what you’re doing, saving yourself a lot of frustration from not being able to solve a trivial issue like this.
Your questions are also kind of generic, a Google search could have given you a lot more practical examples to learn from, we can’t really tell you every AV evasion technique in one reply, or describe all the different ways you can deploy a payload remotely, you have to narrow it down to a few options and then we will know what to tell you exactly. As a general idea, the Veil Framework is pretty good when it comes to AV evasion so check it out, while for deploying Metasploit is one of the most used programs for the job thanks to its huge array of modules. Read how these two useful frameworks work and how to use them, although the first part is much more important in order to understand what’s actually going on and why.
If you have more questions ask away, but be a little more specific so we can be more helpful. And think about that little advice, go back to the basics for a bit beforehand.