Remove item Thumbnail image Product Price Quantity Subtotal
× Detection Engineering Demystified Detection Engineering Demystified 249.00
249.00
× Recon for Pentesting & Bug Bounties Recon for Pentesting & Bug Bounties 249.00
249.00
× Deploy Data Governance and Compliance Deploy Data Governance and Compliance 249.00
249.00

Cart Totals

Subtotal 747.00
GST 134.46
Total 881.46

*Convenience fee & taxes extra

You May Also Like This​

Information Security Risk Management (ISO 27005)
Information Security Risk Management (ISO 27005)
Learn how to identify, assess, and mitigate cybersecurity risks using ISO 27005 guidelines. This course provides a structured approach to risk management, security controls, and compliance strategies, helping strengthen your organization’s security posture.
KPIs for Incident Response Metrics and Measurements
KPIs for Incident Response: Metrics and Measurements
Learn how to measure, analyze, and optimize your incident response (IR) program using key performance indicators (KPIs) and risk models. This course will help you develop skills to improve decision-making and reduce cybersecurity risks.
Attack Surface Discovery using OWASP Amass
Attack Surface Discovery using OWASP Amass
Learn how to identify and map potentially vulnerable external assets using OWASP Amass, the industry-standard tool for asset discovery. This course covers passive and active reconnaissance techniques to scan, analyze, and secure exposed assets.
Stream Premium Cybersecurity Videos Anytime,
Anywhere.

© 2025 EC-Council All rights reserved.