Remove item Thumbnail image Product Price Quantity Subtotal
× Applied IoT Forensics Applied IoT Forensics 249.00
249.00
× Black Hat Python for Pentesters (2024) 166.00
166.00
× Metasploit Like a Pro 999.00
999.00
× Threat Modeling Deconstructed Threat Modeling Deconstructed 166.00
166.00
× Digital Footprinting 529.00
529.00
× Linux Command Line for an Ethical Hacker Linux Command Line for an Ethical Hacker 166.00
166.00

Cart Totals

Subtotal 2,275.00
GST 409.50
Total 2,684.50

*Convenience fee & taxes extra

You May Also Like This​

Applied Attack Surface Analysis and Reduction for Vulnerability Assessment
Go beyond surface-level defenses. Learn how to map, analyze, and reduce your organization’s digital and physical attack surface. Master risk scoring, Zero Trust strategies, layered defense, and real-world techniques used across industries.
Hands-on Network Security
Explore scanning, enumeration, and vulnerabilities with real-world tools and techniques. This course gives you practical, hands-on training to strengthen and assess networks just like adversaries would.
Web Security for Enterprise – Part 1
Take web defense into your own hands. Learn to identify and exploit enterprise-level web vulnerabilities, then lock them down. This hands-on course covers injection flaws, brute force, XSS, and more, using real-world tools like Burp Suite, ZAP, and WPScan.
Stream Premium Cybersecurity Videos Anytime,
Anywhere.

© 2025 EC-Council All rights reserved.