• Home
  • Courses
    • Courses

      Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
START TYPING AND PRESS ENTER TO SEARCH
  • Home
  • Courses
    • Courses

      Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
ADD ANYTHING HERE OR JUST REMOVE IT…
EC-Council Learning
  • Home
  • Courses
    • Courses
  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
Menu
EC-Council Learning
0 items $0.00
  • Home
  • Courses
    • Courses

      Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
START TYPING AND PRESS ENTER TO SEARCH
  • Home
  • Courses
    • Courses

      Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
Click to enlarge
Home STORM Mobile Security Tool Kit Contents
ECES-book-cover
ECES Textbook $277.00
Back to products
Storm T-Shirt $25.00

Mobile Security Tool Kit Contents

$799.00

*Price before tax (where applicable). Ships to continental US & Canada only.

Includes a free t-shirt and sticker!

​​EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with STORM Linux (a Raspbian based, customized distro of Linux equipped with the industry’s most popular hacking tools) loaded onto a portable touchscreen device.

(Sold AS-IS with no warranties expressed or implied)

Compare
Add to wishlist
SKU: Iclass014105 Category: STORM
Share:
  • Description
  • Shipping & Delivery
Description

Toolkit Contents:

  • Broadcom BCM2711, Quad core Cortex-A72 (ARM v8) 64-bit SoC @ 1.5GHz
  • 2GB LPDDR4-3200 SDRAM (depending on model)
  • 2.4 GHz and 5.0 GHz IEEE 802.11ac wireless, Bluetooth 5.0, BLE
  • Gigabit Ethernet
  • 2 USB 3.0 ports; 2 USB 2.0 ports.
  • Raspberry Pi standard 40 pin GPIO header (fully backwards compatible with previous boards)
  • 2 × micro-HDMI ports (up to 4kp60 supported)
  • 2-lane MIPI DSI display port
  • 2-lane MIPI CSI camera port

  • 4-pole stereo audio and composite video port
  • H.265 (4kp60 decode), H264 (1080p60 decode, 1080p30 encode)
  • OpenGL ES 3.1, Vulkan 1.0
  • Micro-SD card slot for loading operating system and data storage
  • 5V DC via USB-C connector (minimum 3A*)
  • 5V DC via GPIO header (minimum 3A*)
  • Power over Ethernet (PoE) enabled (requires separate PoE HAT)
  • Operating temperature: 0 – 50 degrees C ambient
  • Rollup Water Resistant Keyboard
  • Field Case Organizer for all your gear

Shipping & Delivery

Talk to an Expert

If you still have questions our Expert Training Consultancies are here to help.
Get in touch Call 1-888-333-HACK

Related products

STORM Ethical Hacking
Compare

Mobile Security Toolkit: Ethical Hacking with the STORM (Core)

On-Demand, STORM
$999.00

*Price before tax (where applicable.)

Base Package Includes:

  • Video Training
Add to wishlist
Add to cart
Quick view
STORM Ethical Hacking
Compare

Certification Club – Storm Ethical Hacking Core Skills

STORM
$2,999.00

*Price before tax (where applicable.)

Base Package Includes:

  • Video Training
Add to wishlist
Add to cart
Quick view
Sold out
Compare

Gale Force 10 Expansion Pack

STORM
$325.00 – $427.00

*Price before tax (where applicable). Ships to Continental US & Canada Only.

Turn your STORM into a hurricane with the Gale Force 10 expansion pack! EC-Council has assembled the ultimate set of accessories to make your STORM Mobile Security Toolkit even more powerful. This expansion pack adds independent power for complete mobility, further reach, Wi-Fi and radio tools for packet sniffing, drone detection, as well as the ability to add devices to complete your hacking network and isolate it from the customer network both on Wi-Fi and physical Ethernet.
*The Gale Force 10 Expansion Pack is sold as a bundle and not as individual components.
*Images are for reference only and may not depict actual item
Add to wishlist
Select options
Quick view

Contact Us

New Mexico/Phoenix

101C Sun Ave NE Albuquerque, NM 87109
1-888-330-HACK

Florida

Suite 160
2502 North Rocky Point DR Tampa, FL 33607
1-844-HACK-CEH

Canada

40 Crowther Lane Fredericton
NB Canada E3C 2R2
+1 506-307-6586

  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Courses
    • Courses

      Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
START TYPING AND PRESS ENTER TO SEARCH
  • Home
  • Courses
    • Courses

      Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
Shopping cart
Close
Start typing to see posts you are looking for.
Shop
Wishlist
0 items Cart
My account