Linux Basics for Hackers | ✓ | ✓ | ✓ | ✓ | | |
Getting Started Becoming a Master Hacker | ✓ | ✓ | ✓ | 50% off | | |
Radio Basics for Hackers | ✓ | ✓ | ✓ | 50% off | | ✓ |
Privilege Escalation | ✓ | ✓ | ✓ | 50% off | | |
Metasploit Basics for Hackers | ✓ | ✓ | ✓ | 50% off | | |
Advanced Metasploit | ✓ | ✓ | ✓ | 50% off | | |
CWA Prep Course | ✓ | ✓ | ✓ | ✓ | | |
Digital Forensics | ✓ | ✓ | ✓ | 50% off | ✓ | |
Advanced Digital Forensics | ✓ | ✓ | ✓ | 50% off | ✓ | |
Snort for Hackers | ✓ | ✓ | ✓ | 50% off | ✓ | |
SCADA Hacking & Security | ✓ | ✓ | ✓ | 50% off | | |
Scripting for Hackers | ✓ | ✓ | ✓ | 50% off | | |
Mobile Hacking and Security | ✓ | ✓ | ✓ | 50% off | | |
Python Basics for Hackers | ✓ | ✓ | ✓ | 50% off | | |
CCSP+ Training | ✓ | ✓ | ✓ | 50% off | ✓ | |
CISSP Bootcamp | ✓ | ✓ | ✓ | 50% off | | |
Web App Hacking | ✓ | ✓ | ✓ | 50% off | | |
Wi-Fi Hacking | ✓ | ✓ | ✓ | 50% off | | ✓ |
Security+ Bootcamp | ✓ | ✓ | ✓ | 50% off | | |
Network Basics for Hackers | ✓ | ✓ | ✓ | 50% off | | |
Bug Bounty Training | ✓ | ✓ | ✓ | 50% off | | |
Nmap for Hackers | ✓ | ✓ | ✓ | 50% off | | |
Remaining Anonymous | ✓ | ✓ | ✓ | 50% off | | |
Linux Firewalls | ✓ | ✓ | ✓ | 50% off | | |
Mr. Robot Hacks | ✓ | ✓ | ✓ | 50% off | | |
Cryptography Basics for Hackers | ✓ | ✓ | ✓ | 50% off | | |
CASP+ Training | ✓ | ✓ | ✓ | 50% off | | |
Hacking APIs | ✓ | ✓ | ✓ | 50% off | | |
Infrastructure Basics for Hackers | ✓ | ✓ | ✓ | 50% off | | |
Honeypots and Honeynets | ✓ | ✓ | ✓ | 50% off | | |
Anti-Forensics | ✓ | ✓ | ✓ | 50% off | ✓ | |
Incident Response | ✓ | ✓ | ✓ | 50% off | ✓ | |
Active Directory for Hackers | ✓ | ✓ | ✓ | 50% off | | |
Criminal Law for Cybersecurity | ✓ | ✓ | ✓ | 50% off | ✓ | |
Phishing Analysis for Security Analyst | ✓ | ✓ | ✓ | 50% off | ✓ | |
Car Hacking | | ✓ | | 50% off | | ✓ |
Reverse Engineering Malware Part I | | ✓ | | 50% off | | |
Reverse Engineering Malware Part II | | ✓ | | 50% off | | |
The Science and Art of Social Engineering | | ✓ | | 50% off | | |
Cyber Law | | ✓ | | 50% off | ✓ | |
Network Forensics | | ✓ | | 50% off | ✓ | |
Advanced SCADA Hacking and Security | | ✓ | | 50% off | | |
Advanced Web App Hacking | | ✓ | | 50% off | | |
Database Hacking | | ✓ | | 50% off | | |
Advanced Linux for Hackers | | ✓ | | 50% off | | |
Splunk for Security Monitoring | | ✓ | | 50% off | ✓ | |
Open Source Intelligence | | ✓ | | 50% off | ✓ | |
OSINT: How to establish a business | ✓ | ✓ | ✓ | 50% off | | |
Software Defined Radio for Hackers | | ✓ | | 50% off | | ✓ |
Android Hacking | | ✓ | | 50% off | | |
Advanced Python for Hackers | | ✓ | | 50% off | | |
IP Camera Hacking | | ✓ | | 50% off | | |
Advanced SDR for Hackers | | ✓ | | 50% off | | ✓ |
How to Build a Femtocell to Intercept Mobile Traffic | | ✓ | | 50% off | | ✓ |
Bitcoin and Cryptocurrency Forensics | | ✓ | | 50% off | ✓ | |
Cyber Threat Intelligence for Hackers | ✓ | ✓ | ✓ | 50% off | ✓ | |
Satellite Hacking | | ✓ | | 50% off | | ✓ |
IoT Hacking | | ✓ | | 50% off | | ✓ |
Hacking Russia with Voltage | | ✓ | | 50% off | | |
Ransomware Training | | ✓ | | 50% off | | |
Wireshark for Cybersecurity | | ✓ | | 50% off | | |
x86 Assembler Language | | ✓ | | 50% off | | |
AI for Cybersecurity | | ✓ | | 50% off | | |
Cyber Defense from a Military Perspective | ✓ | ✓ | ✓ | 50% off | | |
Data Science Analytics for Cybersecurity | | ✓ | | 50% off | | |
SCADA/ICS Forensics | | ✓ | | 50% off | ✓ | |
Memory Forensics | ✓ | ✓ | ✓ | 50% off | ✓ | |
Advanced Hacking and Penetration Testing | | ✓ | | 50% off | | |
Exploit Development | | ✓ | | 50% off | | |
CWE V2 (Advanced Pentesting Methodology) | ✓ | ✓ | ✓ | 50% off | | |
MITRE ATT&CK Framework for Security Analyst | ✓ | ✓ | ✓ | 50% off | | |