"Truly the best classes I have ever attended. My only regret is that I didn't take the training from them sooner. No fluff, filler, or extraneous material, just hard-hitting nuts and bolts of the profession. Gladly would have paid triple the price." Ryan Emerson - Digital Forensic Examiner

"I attended a well-known class from one of your competitors. I speak for many students when I say that I learned more in the first day of your course than I did in an entire week of the other course." Allan Womac - Evidence Technician

"A co-worker of mine and student of yours is planning to dedicate his personal time off taking training from you again - this speaks volumes of you and your courses." Paul Rodvik - H.P. Corporate Backup Services

"It is rare to find an instructor who is both a good teacher and a true expert in his field. Your teaching style has really sparked my interest in network/computing security." John Bell - The Boeing Company

"I believe I speak for all of your students when I say THANKYOU for all that you do. You show a true dedication to your students and their success - a dedication I have never seen in any other instructor." Donny Neil - The Boeing Company

"I look forward to taking many more classes from you, as you have proven yourself to be one of the true 'Subject Matter Experts' that the entire IT industry builds their certification criteria on. Thanks." James Gotner - Fred Hutchinson Cancer Research Center

"You are not just being taught the fundamentals but are being instructed on how to approach forensics work like a 20 year veteran would. Invaluable training!" Frank Dauenhauer -ICT Security Manager -Aurenav

"I wish I would have known about your course sooner. Now after many months of wasted time and money, I'm finally on the right track." Allan Womac - Evidence Technician

"Mike and Steve have a wealth of forensic knowledge and "real life" professional experience that, when layered onto the CHFI, creates a potent training experience not available anywhere else.  If you want expert training by true experts in the forensic field, Mike and Steve can deliver." Gregg Braunton - Regional Information Security Officer

"These guys are world-class. Superb training, and they helped me solve a Cybercrime case during the week!" Special Agent - Federal Agency

"This was not my first course from CyberSecurity Academy, nor will it be my last.  These gentlemen are amazing instructors that truly are subject matter experts." Tracy Stanley - Information Technology System Specialist

"There is no better place to take a cyber-security class than CyberSecurity Academy!  Steve Hailey and Mike Andrew bring years of experience in the digital forensics area to their classes, and teach not only the class materials but also what it's like to really work on a case. Passing my CHFI certification directly led to my securing a contract position in cyber security with a large government agency." Dennis York - Cyber Security Analyst

"Steve and Mike are great instructors. I learnt a lot and because of them the notes that I took in class made studying for the exam very easy." Neumann Lim - Computer Systems Specialist

"This is the third class I have taken from Steve and Mike and the standard keeps rising! These guys are all about ensuring the student walks out with the BEST training experience possible and they do it CONSISTENTLY! With one of their classes, you won't be disappointed! THANKS!!!!" Jeffrey L Colorossi - CISO

"The class was excellent. Steve and Mike are fabulous instructors and I appreciate everything they did for me." Casey Tilton - Security

"The instructors do a great job in focusing on the important facts in the course materials while providing hands on time to learn and reinforce the core concepts. Their practical knowledge has been earned through years of experience. It is clear that they never take their eyes off of the football and clearly know their stuff. Anyone with an interest in digital forensics would be well served by attending any of their courses." James Clark - Systems Engineer

"!): This was not my first course from CyberSecurity Academy, nor will it be my last. These gentlemen are amazing instructors that truly are subject matter experts." Tracy Stanley - Information Technology Systems Specialist

iLabs - Certified Ethical Hacker and Certified Hacking Forensic Investigator

CEH and CHFI Classes Come With Six Months of Access

The Latest Operating Systems Are Supported

Run Your Labs Directly From The Cloud

For your Certified Ethical Hacker and Certified Hacking Forensic Investigator classes from CyberSecurity Academy, you'll be able to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection. The simplistic web portal enables you to launch an entire range of target machines and access them remotely with one simple click. Practice and do labs on your own schedule - your course tuition comes with six months of access!

Virtualized Solution


With iLabs, lab exercises can be accessed 24x7 allowing you to practice skills in a safe, fully functional network anytime it’s convenient.

The guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing you to launch a range of activities for hacking or testing.

Available target machines are completely virtualized allowing us to control and reset machines quickly and easily with no required instructor or administrative interaction.

You have 100% control of the environment.


Dynamically access virtual machines using a Web Browser. No plug-ins or additional software required. Access the virtual environment with any device that supports HTML5 such as iPad, iPhone, Android devices.
Our labs come with excellent step by step instruction guides. You have complete control of the virtual environment. Start, stop, pause, reboot, create snapshot etc.
With our iLabs virtualized solution you can restore the system to any state or level you desire. The computing device you are using to perform the labs from is not affected in any way. The iLabs virtual environment is available to you 24 x 7 anywhere in the world. Just login and start the session. It is that simple.


Labs For Hacking (CEH)

CEH Labs contain over 80 Gb of Malware, tools, and additional materials delivered in the CEH Training Course. Our iLabs environment has the following Target VM's preconfigured:

Microsoft Windows 2012 Server
Microsoft Windows 8
Microsoft Windows 7
Microsoft Server 2008 R2
Microsoft Server 2003 64 Bit
Microsoft Server 2003 32 Bit
Ubuntu Linux

Target VM's are loaded with vulnerable websites that have mock sensitive information, SQL and XSS vulnerabilities and much more. iLabs also has a set of shared drives with the tools and exercises from the CEH DVD Toolkit preloaded into the isolated environment.

Lab Topics With Step-By-Step Guidance Include:

Foot printing & Reconnaissance
Scanning Networks
System Hacking
Trojans & Backdoors
Viruses & Worms
Social Engineering
Denial of Service
Session Hijacking
Hacking Web servers
Hacking Web Applications
SQL Injection
Evading Firewalls, IDS & Honey pots
Buffer Overflow

Labs For Computer Forensics (CHFI)

Computer Forensics Investigation Process
Searching and Seizing Computers
Digital Evidence
First Responder Procedures
Understanding Hard Disks and File Systems
Windows Forensics
Data Acquisition and Duplication
Recovering Deleted Files and Deleted Partitions
Forensics Investigating using AccessData FTK
Forensics Investigation Using Encase
Steganography and Image File Forensics
Application Password Crackers
Log Capturing and Event Correlation
Network Forensics, Investigating Logs and Investigating Network Traffic
Investigating Wireless Attacks
Investigating Web Attacks
Tracking Emails and Investigating Email Crimes
Mobile Forensics
Investigative Reports

iLabs Screenshots