Mobile Security Tool Kit – Ethical Hacking Workshop

Upcoming Workshops:

Days – 1

Who Should Attend?

IT Admins who are interested in cybersecurity, Ethical Hackers, Pen Testers

What is the Mobile Security Tool Kit?

EC-Council’s Mobile Security Toolkit (Better known as the STORM) is a fully-loaded pen-test platform which comes equipped with a customized distro of Kali loaded onto a portable Raspberry Pi-based touchscreen device.

EC-Council rolled out the STORM as a mobile tool to enhance our certification course offerings by giving online asynchronous students a mobile training option. In this option, the video lectures are loaded directly onto the STORM.

What is the Mobile Security Tool Kit Workshop?

The course content was derived by pulling carefully selected modules from EC-Council’s Certified Network Defender (CND) and Certified Ethical Hacker (CEH) certification courses.

Workshop Dates

Course includes:

  • e-Book
  • Certificate of Attendance (.pdf)
  • STORM Device
  • Keyboard
  • Carry Case
  • STORM T-shirt
  • STORM Sticker

What Students should bring:

  • Laptop (with Micro SD card Reader a plus)
  • Enthusiasm for Learning
  • Knowledge of Linux a major plus!

Storm in the Classroom:

Introducing the STORM!

Mobile Security Toolkit Workshop

Here is what some of our STORM class students had to say:

“I really enjoyed the class, thanks for working with the chapter to get this delivered to the group. Hope we can do something similar next year.” – Anne-Marie Colombo, SAP

“It was a smashing success. In January we should have you talk to the ISSA Board and see how we do more.” – Justin Orcutt, NCC Group

“Everyone enjoyed what EC-Council brought to BSides Huntsville! The STORM Device is so cool and we have attracted a new audience because of EC-Council” – Cary Pool, NAISSA President

“I’ve taken all of EC-Council Courses at TakeDownCon. This was a nice addition to BSides and it was great to sit in a new EC-Council Class and learn a new device!” – Chad Holton, State of AL Alcoholic Beverage Control Board

“It was my first time working with EC-Council and It was great to bring a workshop from such a reputable certification body, this added tremendous value to BSides Tampa and I look forward to working with you all again in 2019!”- Derek Thomas, BSides Tampa Organizer

“The HACKNYC 2018 event has truly changed my Information Security outlook and has greatly improved my overall skills in every aspect. Connecting with Elite Cyber Security Professionals in the private sector and federal government to the 2-day “all-out” Mobile Security Hacking with the Storm Tool in conjunction with the iLabs, and Kevin Cardwell (my trainer) made this a true exceptional Cyber Security training and experience.

The Mobile Security tool kit with Storm 2-day boot camp allows each trainee to focus their attack vectors in hacking web applications, servers, cloud, and use virtualization as your very own cyber range (off-line) and connect your Storm device to it and do pen-testing or allow you to use it as another live node. The instructor was very confident and capable as he thought a wide range of students with various information security experiences and I must say I learned so much. His patience and due-diligence, integrity, dedication, and excitement. While not surprising, EC-Council has provided me a very strong platform to prove my Information Security skills and enhance my overall knowledge.

I’m particularly impressed with how the modules in iLabs taught you how to use the latest cyber-attacks without compromising real networks. You get confidence in the tools, and virtualization is secured and more than ready to take anything you throw at it. The conference (HACKNYC 2018) and Mobile Security Tool Kit hacking with Storm has prepared made me a better-rounded cybersecurity professional. C|EH has taught me about vulnerability testing in a real-world environment, E|CSA is teaching me pen-testing, and Mobile Security with Storm has taught me virtualization, pen-testing capabilities, and the possibilities with this tool are truly amazing.”– Isaac Feliciano, New York Air National Guard


Module 01

Module 01: Technical Introduction to the STORM

  • Hardware Assembly and Chipsets
  • Imaging Techniques
  • Linux ARM Distro options
  • Management of Modules and Meta Packages
  • Industry tips and best practices
  • LAB: Backing up and restoring the STORM image



Module 02

Module 02: Network Traffic Monitoring and Analysis

  • Network Traffic Monitoring and Analysis (Introduction)
  • Advantages of Network Traffic Monitoring and Analysis
  • Network Monitoring and Analysis: Techniques
  • SNMP Monitoring
  • Network Traffic Signatures (normal and attack)
  • Categories of Suspicious Traffic Signatures
  • Attack Signature Analysis Techniques
  • LAB: Using the STORM device for network traffic monitoring and analysis



Module 03

Module 03 Hacking Concepts, Types, and Phases

  • What is Hacking
  • Who is a Hacker?
  • Hacker Classes
  • Hacking Phases
  • Ethical Hacking Concepts and Scope
  • Skills of an Ethical Hacker
  • The Hacking Methodology
  • Footprinting
  • Scanning
  • Enumeration
  • Identify Vulnerabilities
  • Exploitation
  • LAB: Using the Storm Device to perform the hacking methodology and penetration testing



Module 04

Module 04: Exploring the Hacking Methodology

  • Footprinting Concepts
  • What is Footprinting
  • Objectives of Footprinting
  • Footprinting Methods
  • Overview of Scanning
  • Abstract Scanning Methodology
  • Live Systems
  • Ports
  • Services
  • Enumeration
  • Identify Vulnerabilities
  • Exploit
  • Introduction to System Hacking
  • Cracking passwords
  • Privilege Escalation
  • Rootkits
  • LAB: Gaining and maintaining access using your STORM device



Workshop in Huntsville, Alabama

Workshop in New York, New York

Workshop in Dallas, Texas

Tool kit Specs

  • 64 Bit – Quad Core Mobile System with Case
  • 1 GB RAM
  • 7 inch Touch Screen Display
  • 64 GB MicroSD – Preloaded w/Custom Linux Hacking OS
  • 100Mb Ethernet Port
  • 4 USB Ports
  • 802.11n Wireless
  • Bluetooth 4.1
  • Combined 3.5mm Audio Jack and Composite Video
  • Camera Interface (CSI)
  • Display Interface (DSI)
  • VideoCore IV 3D Graphics Core
  • Full HDMI
  • USB 2.0 A to B Micro Power Cable. [The STORM can be powered from a 5V Micro-USB Source, Power Supply not included with base package.]
  • Rollup Water Resistant Keyboard
  • Field Case Organizer for all your gear

Interested but still have questions?