STORM Ethical Hacking

STORM Mobile Security Toolkit: Ethical Hacking Intermediate Skills

STORM Mobile Security Toolkit: Ethical Hacking Intermediate Skills

Take the Storm hacking to the next level! In this course you will learn how to deploy more elite skills, you will learn how to assess the Industrial Control System (ICS) ModBus protocol, and read and write to the registers and coils which can modify the behavior of the controller. You will learn how to integrate the Storm device with AI and perform image recognition. Additionally, you will learn techniques of intrusion analysis and malware forensics. Finally, you will learn how to use your Storm device as a cyber weapon with the concept of deception and much more.

Course Outline

  • Introduction to iLabs for the STORM

  • Overview of Storm Images
  • Lab 1
  • Lab 2

  • Introduction to Hacking Concepts and Methodology Lab
  • Introduction to the Storm Lab – Connecting the Storm Part 1
  • Hacking Concepts and Methodology Section 02
  • Hacking Concepts and Methodology Part 2 Lab

  • Introduction to Galeforce 10 Practical Applications Lab
  • Practical Applications Galeforce Lab

  • WiFi Hacking Section 01
  • WiFi Hacking Lab
  • WiFi Hacking Section 2
  • RF Hacking
  • Wireless Hacking

  • Basic Malware Analysis Lab
  • Forensic Triage Lab 1
  • Forensic Triage Lab 2
  • Introduction to Intrusion Analysis
  • Intrusion Analysis and Monitoring
  • Introduction to Advanced and Extended Storm Topics
  • Live Memory Analysis

  • Deception and Decoy Lab

  • ICS Scada Hacking Section 01 Lab
  • ICS Scada Hacking Section 02 Lab
  • STORM AI Hacking Lab

  • Mouse Jack Recon
  • Mouse Jack Exploit
  • ESP8266

Workshop Includes:

  • iLabs, Online Labs – 6 Month Access
  • Certificate of Attendance (.pdf)

Who is it for?

IT Admins who are interested in cybersecurity, Ethical Hackers, Pen Testers

What is the Mobile Security Tool Kit?

EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with STORM Linux (a Raspbian based, customized distro of Linux equipped with the industry’s most popular hacking tools) loaded onto a portable touchscreen device.

EC-Council rolled out the STORM as a mobile tool to enhance our certification course offerings by giving online asynchronous students a mobile training option. In this option, the video lectures are loaded directly onto the STORM.

Toolkit Specs

  • Broadcom BCM2711, Quad core Cortex-A72 (ARM v8) 64-bit SoC @ 1.5GHz
  • 2GB or 4GB LPDDR4-3200 SDRAM (depending on model)
  • 2.4 GHz and 5.0 GHz IEEE 802.11ac wireless, Bluetooth 5.0, BLE
  • Gigabit Ethernet
  • 2 USB 3.0 ports; 2 USB 2.0 ports.
  • Raspberry Pi standard 40 pin GPIO header (fully backwards compatible with previous boards)
  • 2 × micro-HDMI ports (up to 4kp60 supported)
  • 2-lane MIPI DSI display port
  • 2-lane MIPI CSI camera port
  • 4-pole stereo audio and composite video port

  • H.265 (4kp60 decode), H264 (1080p60 decode, 1080p30 encode)
  • OpenGL ES 3.1, Vulkan 1.0
  • Micro-SD card slot for loading operating system and data storage
  • 5V DC via USB-C connector (minimum 3A*)
  • 5V DC via GPIO header (minimum 3A*)
  • Power over Ethernet (PoE) enabled (requires separate PoE HAT)
  • Operating temperature: 0 – 50 degrees C ambient
  • Rollup Water Resistant Keyboard
  • Field Case Organizer for all your gear

STORM in Action

Storm Workshop Kansas City


Workshop in Huntsville, Alabama

Workshop in New York, New York

Workshop in Dallas, Texas

STORM at Defcon

STORM at Bsides

Terms of Use

Note: The STORM mobile security tool kit contains the STORM Linux (a Raspbian based, customized distro of Linux) including all of the associated security tools. These tools are very powerful and all proper precautions should be adhered to at all times.

Always remember that the difference between illegal and ethical hacking comes down to one word; permission. It is illegal to utilize these or any other pen testing tools on a network or website without permission.

As stated in the terms and conditions, EC-Council is not responsible for illegal use of these tools and you accept the full liability for its usage. The entire code of ethics can be found here.

STORM Ethical Hacking

Build Your On-Demand Training Package

*US Residents Only, not available in West Virginia and Iowa.

Or choose a training option:

Related Courses

Still have questions?


Mon – Fri / 8:00 AM – 5:00 PM

Email Us

Upcoming Live STORM Training:

For Self-Paced, On-Demand training, click here

Train now, pay later with Affirm.