Remove item Thumbnail image Product Price Quantity Subtotal
× Applied Python Cryptography Applied Python Cryptography 249.00
249.00
× Linux Troubleshooting Best Practices Linux Troubleshooting Best Practices 249.00
249.00
× Practical Linux Malware Development Practical Linux Malware Development 249.00
249.00
× Mastering Follina (CVE-2022-30190) Exploitation, Detection, and Mitigation Mastering Follina (CVE-2022-30190): Exploitation, Detection and Mitigation 249.00
249.00

Cart Totals

Subtotal 996.00
GST 179.28
Total 1,175.28

*Convenience fee & taxes extra

You May Also Like This​

Recon for Pentesting & Bug Bounties
Recon for Pentesting & Bug Bounties
Master reconnaissance techniques for ethical hacking, pentesting, and bug bounties in this hands-on course. Learn to expand attack surfaces, perform subdomain enumeration, fuzz targets, and automate processes with industry-leading tools.
Applied IoT Forensics
Applied IoT Forensics
This course teaches you to investigate cyber incidents in IoT ecosystems, extract forensic evidence, and analyze network traffic to uncover security breaches. Explore IoT forensic tools, legal considerations, and real-world case studies.
Attack Surface Discovery using OWASP Amass
Attack Surface Discovery using OWASP Amass
Learn how to identify and map potentially vulnerable external assets using OWASP Amass, the industry-standard tool for asset discovery. This course covers passive and active reconnaissance techniques to scan, analyze, and secure exposed assets.
Stream Premium Cybersecurity Videos Anytime,
Anywhere.

© 2025 EC-Council All rights reserved.