Remove item Thumbnail image Product Price Quantity Subtotal
× Applied IoT Forensics Applied IoT Forensics 249.00
249.00
× Black Hat Python for Pentesters (2024) 166.00
166.00
× Metasploit Like a Pro 999.00
999.00

Cart Totals

Subtotal 1,414.00
GST 254.52
Total 1,668.52

*Convenience fee & taxes extra

You May Also Like This​

Applied Python Cryptography
Applied Python Cryptography
Learn to secure your Python applications and protect sensitive user data using encryption, hashing, and steganography. This hands-on course teaches you to implement cryptographic best practices using free Python libraries.
Practical Linux Malware Development
Practical Linux Malware Development
Learn how to develop undetectable Linux malware using the Go programming language while gaining insights into malware internals, persistence techniques, and Python programming. This course helps you emulate, detect, and mitigate Linux-based threats.
Detection Engineering Demystified
Detection Engineering Demystified
Master the detection-as-code workflow to create, manage, and automate custom threat detections. Learn how to use Sigma, MITRE ATT&CK framework, and implement CI/CD pipelines for automated deployment and validation.
Stream Premium Cybersecurity Videos Anytime,
Anywhere.

© 2025 EC-Council All rights reserved.