Get $1 credit for every $25 spent!

How It Works

Pay What You Want

With each Pay What You Want Bundle, you get something incredible for the price of your choosing. If you beat the average price, you’ll unlock additional products and take home the entire bundle!

Leaderboard Bonus

Make it onto the Leaderboard at ANY point during the sale and gain 1 entry to our exclusive giveaway! Reach the TOP, and gain 5 entries!

Pay What You Want: Pro Ethical Hacker Bundle (MINI)


Ending In:

wishlist
Leaderboard
1 Pierre Mierzwa $230
2 Randy Welch $230
3 Robert Morris $230
4 David Parsons $230
5 Иван Иваново $230
6 Michael LaFontaine Jr $230
7 Michael Lunney $230
8 Joseph Sagiv $230
Giveaway

Product Details

Access
Lifetime
Content
3.50 hours
Lessons
26

Python For Android Hacking Crash Course: Trojan Perspective

Discover How to Test Android Security with Python

By Hussam Khrais | in Online Courses

Mobile security is of utmost importance, and developers will pay good money for pentesters who can identify security breaches in apps. In this course, you’ll learn how to use Python to build a Trojan for ethical hacking purposes. You’ll be able to discover flaws in Android security, and clean them up in one efficient swoop!


  • Access 26 lectures & 3.5 hours of content 24/7
  • Code a simple Android GUI interface w/ Python
  • Build a simple cross platform SSH botnet in Python
  • Create an SSH Android Trojan
  • Transfer & exfiltrate data out of a target device
  • Run Python SSH reverse shell on Windows, Linux, Android

Details & Requirements:

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Hussam Khrais is a senior security engineer with over 5 years in penetration testing, Python scripting and network security where he spends countless hours in forging custom hacking tools in Python.


Hussam currently holds the following certificates in information security:

  • GIAC Penetration Testing – GPEN
  • Certified Ethical Hacker – CEH
  • Cisco Certified Network Professional – Security (CCNP Security)


Access
Lifetime
Content
1.5 hours
Lessons
22

Wi-Fi Hacking with Kali

Come to Grips with One of the Most Popular Ethical Hacking Tools Around

By Amit Hudar | in Online Courses

Network security is an essential to any home or corporate internet connection, which is why ethical hackers are paid big bucks to identify gaps and threats that can take a network down. In this course, you’ll learn how to protect WEP, WPA, and WPA2 networks by using Kali Linux, one of the most popular tools for ethical hackers. By course’s end, you’ll have the know-how to protect network environments like a pro.


  • Access 22 lectures & 1.5 hours of content 24/7
  • Set up a penetration testing environment
  • Learn 4 different ways to install & use Kali Linux
  • Understand how to hack WEP-protect WiFi & learn countermeasures
  • Discover how to hack WiFi using Hydra, a keylogger, or by removing devices

Details & Requirements:

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Amit Huddar is an Internet Entrepreneur and Software Engineer. He runs his own software company “Softdust,” which develops products for new technologies like wearables and other gadgets. He opted for computer science engineering in 2013 at SSIT and started his software company in his first year of engineering.


His skills include: Android app development, HTML, CSS, PHP, C, C++, JAVA, Linux, Building Custom Linux OS, Cloud Computing. Penetration testing, Kali Linux and Hacking.



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
  • This item is excluded from coupons.