Get $1 credit for every $25 spent!

How It Works

Pay What You Want

With each Pay What You Want Bundle, you get something incredible for the price of your choosing. If you beat the average price, you’ll unlock additional products and take home the entire bundle!

Leaderboard Bonus

Make it onto the Leaderboard at ANY point during the sale and gain 1 entry to our exclusive giveaway! Reach the TOP, and gain 5 entries!

Pay What You Want: The Complete White Hat Hacker Certification Bundle


Ending In:

wishlist
Leaderboard
1 Frank Miali $200.00
2 Bill Coyle $35.00
3 Eric Hendricks $25.50
4 Diego Bovi $25.00
5 Jeroen Brauns $22.40
6 Devon Pope $22.40
7 Jesse A Foy $22.40
8 Godfrey Shirima $22.40
Giveaway

Sale ipadpro ad unit

Product Details

Access
Lifetime
Content
18 hours
Lessons
97

Ethical Hacking Mastery in 2019 from Beginner to Advanced

Unlock a Career in Penetration Testing from Kali Linux Installation to Creating a Custom Keylogger

By Jerry Banfield | in Online Courses

Ethical hacking is an extremely valuable job skill that continues to grow in demand as more websites and software are created. Ethical hacking is just hacking used for good, to help people secure their websites, their applications, and their online properties. In this beginner to advanced course, you’ll start with the absolute basics and work your way up to an advanced section where you’ll build your own advanced tools.


  • Access 97 lectures & 18 hours of content 24/7
  • Learn the basics of ethical hacking
  • Code your own command & control center that can receive connections from many PCs
  • Discuss backdoor, keyloggers, & other advanced tools
  • Learn to code in Python & C

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Instructor

Jerry Banfield has been an online entrepreneur since 2011, having served hundreds of clients in over 20 countries and managed billions of Facebook ads. He has learned how to drive large amounts of organic Google and YouTube traffic to his website, and teaches online courses sharing his experience with students worldwide. A member of the MENSAsociety, Jerry holds degrees from the University of South Carolina and the University of South Florida.


Access
Lifetime
Content
8 hours
Lessons
62

Start Ethical Hacking in 2019

Build Network Penetration & Ethical Hacking Skills

By Jerry Banfield | in Online Courses

In this course, you will learn how to become a white hat hacker using Kali Linux! From the basics of setting up your own ethical hacking lab through to web penetration testing, you’ll get a comprehensive, beginner-friendly education that will help you break into one of the fastest growing careers on the planet.


  • Access 62 lectures & 8 hours of content 24/7
  • Get an introduction to ethical hacking
  • Set up a lab environment & learn Kali Linux basics
  • Gain access to networks & perform penetration testing
  • Explore post connection attacks, detection, & security
  • Gain access to computer using server-side attacks

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Requirements

  • Internet required

Instructor

Jerry Banfield has been an online entrepreneur since 2011, having served hundreds of clients in over 20 countries and managed billions of Facebook ads. He has learned how to drive large amounts of organic Google and YouTube traffic to his website, and teaches online courses sharing his experience with students worldwide. A member of the MENSAsociety, Jerry holds degrees from the University of South Carolina and the University of South Florida.


Access
Lifetime
Content
4 hours
Lessons
24

Be A White Hat Hacker & Pentester

Learn Some of the Most Important White Hat Hacking Tools

By Eduonix Learning Solutions | in Online Courses

This course will provide a conceptual framework for your cybersecurity training while teaching you the practical techniques you’ll need to perform penetration testing. You’ll cover not just theoretical concepts but also follow along with practical demonstrations of various tools like Metasploit, Scapy, and WireShark.


  • Access 24 lectures & 4 hours of content 24/7
  • Learn about footprinting & reconnaissance, email harvesting, SSL scan, Maltego, & more
  • Use Scapy for packet crafting & port scanning
  • Master techniques for password cracking, MITM, sniffing SSL & RDP attacks
  • Explore standards in wireless security, WEP encryption, & protecting wireless networks
  • Discover how to use Metasploit for your projects

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Requirements

  • Internet required

Instructor

Eduonix creates and distributes high-quality technology training content. Their team of industry professionals has been training manpower for more than a decade. They aim to teach technology the way it is used in the industry and professional world. They have a professional team of trainers for technologies ranging from Mobility, Web and Enterprise, and Database and Server Administration.


Access
Lifetime
Content
7 hours
Lessons
128

From Zero to Hero in Web, Network & WiFi Hacking

Learn Basic to Advanced Web, Network, & WiFi Hacking

By Learn Pentest | in Online Courses

This course aims to teach you in-depth WiFi hacking and security. Upon completion, you’ll be confident in breaking all types of WiFi encryption methods. Starting as a complete beginner with little to no knowledge of WiFi security and Kali Linux, you’ll learn the most important elements of WiFi hacking so you can begin applying them to a career in ethical hacking.


  • Access 128 lectures & 7 hours of content 24/7
  • Get an introduction to Kali Linux & network basics
  • Learn how to passively & actively gather information
  • Identify vulnerabilities in a target
  • Overrun buffer memory, perform password attacks, attack WiFi networks, & more
  • Discuss client side & server side web vulnerabilities
  • Test & exercise your defenses to ensure they’re up to task by simulating real-world attacks

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Instructor

LearnPentest is a group of penetration testers and ethical hackers with an extensive background in web application security, web and software development, network administration and exploit development. They have over 7 years of professional experience in the cyber security domain. Their instructors hold some of the most valuable certifications in the cyber security domain including: OSCP, LPT, C|EH, CISSP, OSCE.


Access
Lifetime
Content
8 hours
Lessons
80

Ethical Hacking Using Kali Linux From A to Z

Discover the Power of Kali Linux, One of the Most Popular Ethical Hacking Tools

By Mohamed Atef | in Online Courses

To break into the world of professional penetration testing, you’ll need to be an ace with Kali Linux. This course will introduce you to the latest ethical hacking tools and techniques with Kali Linux, using a testing lab for practicing different types of attacks. Across the course, you’ll simulate an entire penetration test from beginning to end, giving you verifiable hands-on experience.


  • Access 80 lectures & 8 hours of content 24/7
  • Get comfortable w/ Kali Linux & learn the penetration testing phases
  • Manage Kali Linux HTTP & SSH services
  • Discover essential tools like Netcat & WireShark
  • Gather passive & active information
  • Explore how to perform & defend against a variety of attacks
  • Receive monthly virtual machines as a hacking challenge

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.


  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374


Access
Lifetime
Content
2 hours
Lessons
31

Website Hacking & Penetration Testing

Learn Information Gathering, Cross Site Scripting, Command Execution & Much More with Real-World Tips

By Updegree | in Online Courses

The objective of this course is to teach you how to perform full penetration testing on web applications and websites. This hands-on, 100% practical guide will help you gain the confidence to perform and operate penetration tests like a pro. Before you know it, you’ll have a lucrative skill set that you can market to gain in-demand jobs.


  • Access 31 lectures & 2 hours of content 24/7
  • Learn proper lab environment setup
  • Understand how websites & web applications work
  • Use a personal proxy to intercept HTTP requests
  • Collect sensitive information via the web to learn more about a target
  • Get a step-by-step blueprint of web app & website hacking

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: advanced

Requirements

  • Internet required

Instructor

UpDegree is a Group of IT skilled People having sound technical knowledge on various IT domain.


We work for different MNC including Microsoft, IBM, CISCO, eBay, Amazon, Flipkart, and a lot of startups also. We teach you practical hands-on computer skills what you need for a Job in the IT Sector. Less theory and more practical! Learn through example and step-by-step.


Access
Lifetime
Content
2 hours
Lessons
22

How to Build a $120,000/Year Career as a Web Penetration Tester

Pinpoint Network Vulnerabilities in Order to Prevent Attacks by Hackers

By IT University | in Online Courses

If you’re looking to build a career in security, there’s no better place to focus your efforts than penetration testing. By understanding the vulnerabilities and dangers presented by your network’s structure, you’ll learn how to remedy these gaps and save your company from major security breaches.


  • Access 22 lectures & 2 hours of content 24/7
  • Master ethical hacking techniques used in penetration systems
  • Learn the basic methods for penetration testing of a web application
  • Go step-by-step through the entire penetration testing process
  • Control remote servers
  • Practice finding vulnerabilities in apps
  • Learn to gain information on potential targets
  • Study various attack types: authentication, session management, access controls, data stores, etc.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Instructor

Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.


Access
Lifetime
Content
11 hours
Lessons
85

Hack People, Systems & Mobile Devices

Learn Advanced Social Engineering Techniques to Crack Mobile Devices

By IT University | in Online Courses

To completely understand computer security, it’s vital to think outside the box. It’s not just about firewalls, Intrusion Prevention Systems, or antivirus. It’s also about tricking people into doing whatever a hacker wishes. A secure system, therefore, is also about informed people. This training is based on a practical approach of day-by-day situations contained labs based on real environments. The aim is to help you learn ethical hacking techniques and methodology used in penetration systems to better protect yourself and those around you.


  • Access 85 lectures & 11 hours of content 24/7
  • Cover both theoretical & practical aspects of ethical hacking
  • Work in hands-on labs about hacking systems, networks, wireless, mobile, & websites

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Instructor

Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.


Access
Lifetime
Content
5 hours
Lessons
37

Rootkits & Stealth Apps: Creating & Revealing 2.0

Here's Your Complete Guide to Rootkit & Stealth Software Development.

By IT Security Academy | in Online Courses

This course covers all the important techniques related with rootkits and creating invisible software used by hackers, system administrators, pentesters and IT forensic analysts. Dive in, and you’ll learn how to create a rootkit, keylogger, backdoor, and more stealthy threats hackers use to take over systems.

  • Access 37 lectures & 5 hours of content 24/7
  • Learn how to keep a rootkit in a system
  • Dive into creating a backdoor
  • Learn how to create an invisible keylogger & remote console
  • Walk through creating undetectable applications
  • Learn how to deceive anti-virus applications

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Requirements


  • Internet required

Instructor

IT Security Academy is a company that associates IT Security Professionals. Certified experts (MCSE:MS, CISSP) have created courses from Beginner to Advanced level. Its goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you practical skills.



Terms

  • Unredeemed licenses can be returned for store credit within 15 days of purchase. Once your license is redeemed, all sales are final.