Mobile Security Toolkit: Ethical Hacking with the STORM (Intermediate)

From: $500.00

Base package includes:

  • Instructor led training modules (1 year access)
  • iLabs, Online Labs (6 months)
  • Certificate of Attendance

If you add the STORM device to your course, you also receive:

  • STORM Device
  • Keyboard
  • Carry Case
  • STORM T-Shirt
  • STORM Sticker

Customize your package by selecting add-on options below,
or if you still have questions Contact Us.

    Product Quantity

    Mobile Security Tool Kit with Course

    (Sold AS-IS with no warranties expressed or implied)

    Includes a free t-shirt and sticker!

    EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with STORM Linux (a Raspbian based, customized distro of Linux equipped with the industry’s most popular hacking tools) loaded onto a portable touchscreen device.

    Regular Price: $749


    Ethical Hacking with the STORM Bundle

    Bundle the two STORM courses and save!


    EC-Council Phishing Program

    We are pleased to provide all of our students this no charge offer to run one free phish on your internal staff to determine if they are susceptible to phishing attacks. Remember, you might not be phishing your staff, but someone is. The question is do your users know how to recognize a phishing attack. Let’s find out!

    Note: Must be executed on your corporate domain with proper authorization to run a test campaign. (All results are confidential.)



    Now accepting payments through Affirm!

    Take the Storm hacking to the next level! In this course you will learn how to deploy more elite skills, you will learn how to assess the Industrial Control System (ICS) ModBus protocol, and read and write to the registers and coils which can modify the behavior of the controller. You will learn how to integrate the Storm device with AI and perform image recognition. Additionally, you will learn techniques of intrusion analysis and malware forensics. Finally, you will learn how to use your Storm device as a cyber weapon with the concept of deception and much more.

    Course Overview