Get $1 credit for every $25 spent!

The Complete 2022 PenTest & Ethical Hacking Bundle

Ending In:
Add to Cart - $49
Add to Cart ($49)
$1,770
97% off
wishlist
Courses
6
Lessons
286
Enrolled
204

What's Included

Product Details

Access
Lifetime
Content
17.85 hours
Lessons
49

CompTIA PenTest+ (PT0-002)

Plan & Scope Penetration Tests, Conduct Passive Reconnaissance, Perform Non-technical, and Analyze Vulnerabilities

By iCollege | in Online Courses

The CompTIA PenTest+ certification equips you to plan, conduct, analyze, and report on penetration tests. Your ability to learn and master these skills will bring value to organizations because it proves that you can ensure their data is secure. In this course, you’ll learn how to plan and scope penetration tests, conduct passive reconnaissance, perform non-technical tests to gather information and conductive active reconnaissance, and analyze vulnerabilities. Additional skills include using a fictitious company to learn how to penetrate networks, exploit host-based vulnerabilities, test applications, and complete post-exploit tasks.

5.0/5 average rating: ★ ★ ★ ★ ★

  • Access 49 lectures & 17.85 hours of content 24/7
  • Prove your ability to prepare for exploitation then perform a vulnerability scan
  • Validate your skills in using penetration testing tools to discover & exploit vulnerabilities
  • Demonstrate your ability to prepare for exploitation, perform a vulnerability scan, & analyze and report exploited weaknesses
  • Showcase your value as a cybersecurity professional capable of implementing risk-mitigating controls
  • Adhere to ethical security behavior for risk analysis & mitigation
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success. Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home.

We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be. Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

The course is presented, authored, & provided by ITProTV.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • CompTIA A+, Network+ and Security+ certification.
  • 2 years of hands-on, technical IT experience.

Access
Lifetime
Content
12.18 hours
Lessons
37

Hands-On Hacking

Apply Your Hacking Skills & Tools to Successfully Scan, Enumerate, Access, and Escalate Privilege Against Multiple Purposely Vulnerable VMs

By iCollege | in Online Courses

To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills. One of the best ways of accomplishing that goal is by way of practical application. In this series, you'll be instructed on how to apply your hacking skills and tools to successfully scan, enumerate, access, and escalate privilege against multiple purposely vulnerable, virtual machines (VM). Each VM will present similarities and differences, offering unique challenges that your tools and techniques will need to be applied to overcome.

4.21/5 average rating: ★ ★ ★ ★

  • Access 37 lectures & 12.18 hours of content 24/7
  • Learn basic network penetration
  • Apply basic hacking concepts
  • Learn how hackers hack computer systems
  • Know different leading practices & tools for vulnerability testing
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success. Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home.

We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be. Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

The course is presented, authored, & provided by ITProTV.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic networking skills, IP addressing, familiarization with ports and services, configure a network adapter, use PING, IFCONFIG, IPCONFIG

Access
Lifetime
Content
41.88 hours
Lessons
116

Certified Ethical Hacker (CEH) v11

Know the Latest Commercial-Grade Hacking Tools, Techniques, & Methodologies for Lawful Hacking

By iCollege | in Online Courses

EC-Council's Certified Ethical Hacker(CEH) course is meant to give the student a foundational knowledge and skillset to be an asset to their current organization as a security analyst or become an effective member of a security team engaged in offensive security testing and vulnerability assessments. In this course, you'll learn about specific topics including Intro to Ethical Hacking, Information gathering through foot-printing and reconnaissance techniques, network and system scanning, service enumeration, vulnerability discovery and analysis, system hacking, malware, social engineering, web application hacking, SQL Injection, Wireless, Mobile, IoT, and more.

5.0/5 average rating: ★ ★ ★ ★ ★

  • Access 116 lectures & 41.88 hours of content 24/7
  • Possess a strong background knowledge of networking, telecommunications, web, & computer systems
  • Understand the current security protocols for popular operating environments
  • "Hack" into an organization's network/systems - with its permission - to assess weaknesses & vulnerabilities
  • Undertake preventive, corrective & protective countermeasures to safeguard systems against malicious attack
  • Identify & crack multiple types of passwords, and effectively counter password attacks
  • Comprehend the terminology, stages, classes, phases & methodologies of ethical hacking
  • Cover tracks & erase digital evidence of networks and system intrusions
  • Understand cryptography & encryption techniques, and private/public key infrastructure
  • Adhere to a code of ethics governing professional conduct & the appropriateness of hacking
  • Understand common cyber attacks
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success. Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home.

We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be. Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

The course is presented, authored, & provided by ITProTV.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Fundamental working knowledge of computers and basic experience doing system administration or help desk work

Access
Lifetime
Content
13.31 hours
Lessons
37

CertNexus CyberSec First Responder (CFR-310)

Classify Threat Targets Commonly Attacked by Threat Actors

By iCollege | in Online Courses

Cybersecurity professionals require a well-rounded understanding of the tools, processes, and strategies that can be employed to defend their information systems from constantly evolving threats. CyberSec First Responder (CFR) is a comprehensive certification designed to validate the knowledge and skills required to protect these critical information systems before, during, and after an incident. Analyzing the threat landscape can be a daunting task. This course will assist you in that effort by classifying the threat targets commonly attacked by threat actors.

4.38/5 average rating: ★ ★ ★ ★

  • Access 37 lectures & 13.31 hours of content 24/7
  • Perform analysis of attacks in the computing & network environments
  • Validating the post-attack techniques
  • Perform vulnerability management in the organization
  • Perform the security evaluation with penetration testing
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success. Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home.

We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be. Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

The course is presented, authored, & provided by ITProTV.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Access
Lifetime
Content
7.31 hours
Lessons
22

Practical PenTesting Featuring Brad Stine

Use Ethical Hacking Techniques & Conduct Professional Penetration Test Workflow Using Kali Linux

By iCollege | in Online Courses

This course includes topics like Pre-engagement activities, statements of work, authorization, and the different stages of assessment. Learn how to use the ethical hacking techniques and how to conduct a professional penetration test workflow using the Swiss Army Knife operating system Kali Linux. All the techniques in this course are practical and work against real systems, you'll understand the whole mechanism of each technique first, then you'll learn how to use it to hack into the target system, so by the end of the course you'll be able to modify these techniques to launch more powerful attacks and adapt them to suit different situations and different scenarios.

4.51/5 average rating: ★ ★ ★ ★

  • Access 22 lectures & 7.31 hours of content 24/7
  • Learn how to secure systems from hackers
  • Use ethical hacking techniques
  • Conduct a professional penetration test workflow using Kali Linux
  • Modify these techniques to launch more powerful attacks
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success. Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home.

We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be. Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

The course is presented, authored, & provided by ITProTV.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic IT Skills

Access
Lifetime
Content
9.31 hours
Lessons
25

Penetration Testing

Explore Topics Like Hacking Platforms & Test Environments, Creating Bind/Reverse Shells, and More

By iCollege | in Online Courses

This series will discuss, explain, and demonstrate some of the common tools and techniques used by Penetrations Testers during a security audit. Watch as they explore topics like hacking platforms and test environments, creating BIND/REVERSE shells, discovering and exploiting Buffer Overflows, Cross-Site Scripting attacks, Local and Remote File Inclusion attacks, SQL-Injection, Password attacks, Privilege Escalation, and Port Redirection.

4.51/5 average rating: ★ ★ ★ ★

  • Access 25 lectures & 9.31 hours of content 24/7
  • Know the common tools & techniques used by penetration testers during a security audit
  • Explore hacking platforms & test environments
  • Create BIND/REVERSE shells
  • Discover & exploit Buffer Overflows, Cross Site Scripting attacks, and more
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success. Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home.

We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be. Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

The course is presented, authored, & provided by ITProTV.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications


Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.