Get $1 credit for every $25 spent!

How It Works

Pay What You Want

With each Pay What You Want Bundle, you get something incredible for the price of your choosing. If you beat the average price, you’ll unlock additional products and take home the entire bundle!

Leaderboard Bonus

Make it onto the Leaderboard at ANY point during the sale and gain 1 entry to our exclusive giveaway! Reach the TOP, and gain 5 entries!

Pay What You Want: White Hat Hacker Training Bundle


Ending In:

wishlist
Leaderboard
1 William Torgerson $70.00
2 Michael Stevenson $60.00
3 Robert Thomas $55.00
4 Linda Marie Franchell $50.00
5 Gary Sumners $50.00
6 Keith Olson $50.00
7 Truman Soutar $43.30
8 Richard Kuehne $43.29
Giveaway

Product Details

Access
Lifetime
Content
10 hours
Lessons
83

Network Hacking Continued: Intermediate to Advanced

Learn Advanced Techniques to Hack Into WiFi & Wired Networks

By iSecur1ty | in Online Courses

Course Description

This advanced network hacking course is designed to build on your foundational knowledge. It aims to break down each attack into smaller components so you can understand how each of these components works. By the end of the course, you’ll be able to mix attacks and adopt attacks to suit different situations and different scenarios, as well as know how to write your own man in the middle scripts to implement your own man in the middle attacks.


  • Access 83 lectures & 10 hours of content 24/7

  • Learn how to extend the pre-connection attacks that you already know

  • Extend the deauthentication attack to target multiple clients & multiple networks at once

  • Understand a number of advanced techniques to gain access to various network configurations & encryptions

  • Discover how to manually configure & create a fake access point

  • Create fake captive portals, steal WPA/WPA2 passwords & spy on clients

  • Cover post-connection attacks

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: advanced

Requirements

  • Internet required

Instructor

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.


Access
Lifetime
Content
1.5 hours
Lessons
22

Practical Hacking 2018

Learn How to Bypass Anti-Virus & Firewalls & How to Defend Against Invasion

By Arsalan Saleem | in Online Courses

Course Description

In this course, you’ll create undetectable malware and try to gain access to up-to-date, fully patched systems. From there, you’ll attempt to bind payloads with different files and hack systems outside your own network. By course’s end, you’ll be able to create malware that can bypass any antivirus and firewall, and be able to defend a network against those same attacks.


  • Access 22 lectures & 1.5 hours of content 24/7

  • Bypass any up-to-date antivirus

  • Learn advanced payload creation

  • Bind your payload w/ an image file

  • Change extension of your payload to jpg

  • Maintain access once you have gained it

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Requirements

  • Internet required

Instructor

Arsalan Saleem is a Security Expert and Software Developer with 7+ years experience. He loves to work on innovative offensive security ideas. He has developed many web applications and mobile applications and has also worked on the security of industrial software.


Access
Lifetime
Content
16 hours
Lessons
92

The Complete Ethical Hacking Course: Beginner to Advanced 2.0

Everything You Need to Know About the Art of Ethical Hacking

By Ermin Kreponic | in Online Courses

Course Description

If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or elevate your IT career, this is the course for you. Here, you’ll learn from experienced network security professionals while covering the most important topics in ethical hacking today.


  • Access 92 lectures & 16 hours of content 24/7

  • Get an introduction to ethical hacking

  • Learn how to install Linux, terminal basics, & Wireshark setup

  • Understand how to stay anonymous online & access the dark web using TOR

  • Explore aircark-ng, HashCat, & WiFi hacking

  • Defend your own networks from attacks

  • Clone websites

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Requirements

  • Internet required

Instructor

Arsalan Saleem is a Security Expert and Software Developer with 7+ years experience. He loves to work on innovative offensive security ideas. He has developed many web applications and mobile applications and has also worked on the security of industrial software.


Access
Lifetime
Content
1 hours
Lessons
17

How to Hack WiFi Networks for Beginners

Learn How to Hack WEP, WPA & WPA2 Networks

By Juravlea Nicolae | in Online Courses

Course Description

This course is all about WiFi and the security of wireless networks. You’ll study different threats, weaknesses, and attack methods for WiFi hacking. After completing this course, you’ll be confident with breaking all types of WiFi encryption methods.


  • Access 17 lectures & 1 hour of content 24/7

  • Learn how wireless networks work

  • Understand important setting to change on your router

  • Install Kali Linux in VMware player

  • Explore useful Linux commands w/ examples

  • Perform a Denial of Service Attack & find hidden wireless networks

  • Use various tools like Aircrack-ng, WiFite, Crunch, Cowpatty, Pyrit, & Reaver

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Requirements

  • Internet required

Instructor

Nicolae Juravlea loves computers and technology, particularly in the areas of wireless encryption protocols, web development, network security, and anonymity. He has worked on various projects involving web design, networking, web application security, and other technology-related subjects.


Access
Lifetime
Content
4.5 hours
Lessons
56

The Complete Nmap Ethical Hacking Course: Network Security

Become an Ethical Hacking & Network Security Expert Using Nmap

By Nathan House | in Online Courses

Course Description

Nmap is the internet’s most popular network scanner with advanced features that even seasoned professionals don’t know about. In this complete course, you’ll uncover secrets of ethical hacking and network discovery using Nmap. You’ll go from beginner to expert in easy to follow, structured steps covering all major platforms including Windows, Mac, Linux, and Kali. At the end of the course, you’ll have a practical skill set in using Nmap to scan networks.


  • Access 56 lectures & 4.5 hours of content 24/7

  • Become an expert in using Nmap for ethical hacking, system administration & network security

  • Learn how to successfully discover active & vulnerable hosts on a network

  • Master service detection, version detection, operating system detection, & optimizing timing and performance

  • Scan to determine firewall rules while avoiding intrusion detection systems (IDS)

  • Understand how Nmap is used in combination w/ criminal hacking infrastructures

  • Cover both the command line version of Nmap & the GUI version of Nmap called Zenmap

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Requirements

  • Internet required

Instructor

Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK’s mobile banking and payment solutions helping secure to date over £71Bn in transactions.


His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.


Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan’s qualifications and education include:


  • BSc. (Hons) Computing ‘Networks & Communication’ 1st Class Honors
  • SCF : SABSA Charted Architect Foundation
  • CISSP : Certified Information Systems Security Professional
  • CISA : Certified Information Systems Auditor
  • CISM : Certified Information Security Manager
  • ISO 27001 Certified ISMS Lead Auditor
  • CEH : Certified Ethical Hacker
  • OSCP : Offensive Security Certified Professional


Access
Lifetime
Content
11.5 hours
Lessons
125

Learn Ethical Hacking from Scratch

Protect Yourself & Your Systems from All Kinds of Security Threats

By Zaid Sabih | in Online Courses

Course Description

Interested in hacking for the good guys? This comprehensive course will take you from zero to hero in the field of ethical hacking, the career path where you get paid to expose system and network security threats. You’ll explore four main sections: network penetration testing, gaining access, post exploitation, and web app penetration testing to get a complete, well-rounded education in how to responsibly and effectively improve security.


  • Access 125 lectures & 11.5 hours of content 24/7

  • Learn basic network pentesting

  • Gather information about networks & computers, & learn how to gain access & attack targets

  • Understand how to gain full access to computer systems w/o user interaction

  • Create server side & client side attacks

  • Discover how to interact w/ the systems you’ve compromised

  • Learn how to detect, prevent, & secure your system & yourself from every attack you learn

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.


Access
Lifetime
Content
9.5 hours
Lessons
68

Certified Information Systems Security Professional

Immerse Yourself in Practice Materials for the CISSP, One of the Top Security Certifications on Earth

By Mohamed Atef | in Online Courses

Course Description

The CISSP is an internationally recognized certification that demonstrates an IT professional’s technical and managerial competence to protect organizations from increasingly sophisticated attacks. It’s an ideal certification for anyone who wants to work in IT as it satisfies all government and professional security certification mandates and leaps out on a resume. In this course, you’ll receive in-depth instruction in all things CISSP, so you can be fully prepared when you decide it’s time to take the exam.


  • Access 68 lectures & 9.5 hours of content 24/7

  • Discuss penetration testing & information systems access control

  • Explore common security architecture frameworks

  • Understand different network types & topologies

  • Learn about cryptography, physical security, & operations security

  • Discuss the legal regulations & liability behind systems security

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.


  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374


Access
Lifetime
Content
1 hours
Lessons
23

Web Hacking for Beginners

Learn How to Exploit & Secure Websites

By Juravlea Nicolae | in Online Courses

Course Description

This course will introduce you to the various methods, tools, and techniques used by attackers. You’ll study web application flaws and their exploitation. Upon completion, you’ll understand major web application flaws and how to exploit a number of dangerous vulnerabilities like SQL injections, CSRF attacks, XSS vulnerabilities, phishing, and more.


  • Access 23 lectures & 1 hour of content 24/7

  • Learn how the web works

  • Use the Vega Web Vulnerability Scanner

  • Understand SQL injection attacks

  • Hack WordPress w/ WPscan

  • Discuss cross-site scripting & cross-site request forgery

  • Hook victims using BeEF Framework

  • Gain full control over the target machine

  • Discover how phishing works

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Requirements

  • Internet required

Instructor

Nicolae Juravlea loves computers and technology, particularly in the areas of wireless encryption protocols, web development, network security, and anonymity. He has worked on various projects involving web design, networking, web application security, and other technology-related subjects.



Terms

  • Instant digital redemption