Remove item Thumbnail image Product Price Quantity Subtotal
× Hands-on Zero Day Exploit 983.18
983.18
× Data Wrangling with Pandas - Part 2 699.00
699.00
× Advanced Persistent Threat Course 909.00
909.00
× Applied Microsoft SQL Server Security Applied Microsoft SQL Server Security 409.00
409.00
× Open-Source Intelligence 1,119.00
1,119.00
× Data Science for Beginners 699.00
699.00
× An Introduction to Scikit-Learn An Introduction to Scikit-Learn 699.00
699.00
× Advanced Machine Learning for Business Professionals 699.00
699.00
× Attack Surface Discovery using OWASP Amass Attack Surface Discovery using OWASP Amass 249.00
249.00
× Practical Industrial Control System Penetration Testing Practical Industrial Control System Penetration Testing 409.00
409.00
× Hands-on FortiGate Firewall 909.00
909.00
× Applied Logistic Regression 699.00
699.00
× Recon for Pentesting & Bug Bounties Recon for Pentesting & Bug Bounties 249.00
249.00
× Mastering Istio for Kubernetes Security 909.00
909.00
× Testing Web Services/APIs with SoapUI 409.00
409.00
× The SQL Programming Essentials Immersive Training 799.00
799.00
× Hands-on Penetration Testing with BlackArch Linux 1,199.00
1,199.00

Cart Totals

Subtotal 12,047.18
GST 2,168.49
Total 14,215.67

*Convenience fee & taxes extra

You May Also Like This​

Mastering Digital Forensics Bundle
Learn to detect and backtrack cyber criminals and hackers with digital forensics. This hands-on learning bundle includes 3 premium courses, 10+ hours of practical learning content, 60 videos and 70 assessments questions.
Mastering Follina (CVE-2022-30190) Exploitation, Detection, and Mitigation
Mastering Follina (CVE-2022-30190): Exploitation, Detection and Mitigation
Learn how attackers exploit the Follina vulnerability (CVE-2022-30190) in Microsoft Office and develop the skills to analyze, detect, and mitigate this critical flaw through hands-on exercises and real-world examples.
Detection Engineering Demystified
Detection Engineering Demystified
Master the detection-as-code workflow to create, manage, and automate custom threat detections. Learn how to use Sigma, MITRE ATT&CK framework, and implement CI/CD pipelines for automated deployment and validation.
Stream Premium Cybersecurity Videos Anytime,
Anywhere.

© 2025 EC-Council All rights reserved.