Remove item Thumbnail image Product Price Quantity Subtotal
× Linux Command Line for an Ethical Hacker Linux Command Line for an Ethical Hacker 166.00
166.00
× Threat Modeling Deconstructed Threat Modeling Deconstructed 166.00
166.00

Cart Totals

Subtotal 332.00
GST 59.76
Total 391.76

*Convenience fee & taxes extra

You May Also Like This​

Learn Linux Security Through Practical Steps
Learn Linux Security Through Practical Steps
Gain essential knowledge and skills to secure your Linux systems with this hands-on course. You’ll learn to implement GRUB password protection, manage users with PAM, configure secure SSH access, and more.
Offensive Perspective - OWASP Security for Developers
Offensive Perspective – OWASP Security for Developers
Gain a solid understanding of offensive security techniques and how to secure applications against OWASP vulnerabilities. You’ll learn web penetration testing methods, how to exploit vulnerabilities like XSS and SQL Injection, and more.
Kali for Penetration Testers
Kali for Penetration Testers
Learn how to perform penetration testing with Kali Linux. This comprehensive course covers various concepts and methods of penetration testing in a modern networked world and will take you from a beginner level to a more advanced level.
Stream Premium Cybersecurity Videos Anytime,
Anywhere.

© 2025 EC-Council All rights reserved.