Remove item Thumbnail image Product Price Quantity Subtotal
× Secure Mobile Payment Systems 819.00
819.00
× Deploy Data Governance and Compliance Deploy Data Governance and Compliance 249.00
249.00
× Practical Linux Malware Development Practical Linux Malware Development 249.00
249.00
× Attack Surface Discovery using OWASP Amass Attack Surface Discovery using OWASP Amass 249.00
249.00

Cart Totals

Subtotal 1,566.00
GST 281.88
Total 1,847.88

*Convenience fee & taxes extra

You May Also Like This​

Recon for Pentesting & Bug Bounties
Recon for Pentesting & Bug Bounties
Master reconnaissance techniques for ethical hacking, pentesting, and bug bounties in this hands-on course. Learn to expand attack surfaces, perform subdomain enumeration, fuzz targets, and automate processes with industry-leading tools.
Information Security Risk Management (ISO 27005)
Information Security Risk Management (ISO 27005)
Learn how to identify, assess, and mitigate cybersecurity risks using ISO 27005 guidelines. This course provides a structured approach to risk management, security controls, and compliance strategies, helping strengthen your organization’s security posture.
KPIs for Incident Response Metrics and Measurements
KPIs for Incident Response: Metrics and Measurements
Learn how to measure, analyze, and optimize your incident response (IR) program using key performance indicators (KPIs) and risk models. This course will help you develop skills to improve decision-making and reduce cybersecurity risks.
Stream Premium Cybersecurity Videos Anytime,
Anywhere.

© 2025 EC-Council All rights reserved.