iLabs - Certified Ethical Hacker and Certified Hacking Forensic Investigator
CEH and CHFI Classes Come With Six Months of Access
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Run Your Labs Directly From The Cloud
For your Certified Ethical Hacker and Certified Hacking Forensic Investigator classes from CyberSecurity Academy, you'll be able to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.
The simplistic web portal enables you to launch an entire range of target machines and access them remotely with one simple click. Practice and do labs on your own schedule - your course tuition comes with six months of access!
Virtualized Solution
With iLabs, lab exercises can be accessed 24x7 allowing you to practice skills in a safe, fully functional network anytime it’s convenient.
The guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing you to launch a range of activities for hacking or testing.
Available target machines are completely virtualized allowing us to control and reset machines quickly and easily with no required instructor or administrative interaction.
You have 100% control of the environment.
![]() |
Dynamically access virtual machines using a Web Browser. No plug-ins or additional software required. | ![]() |
Access the virtual environment with any device that supports HTML5 such as iPad, iPhone, Android devices. |
![]() |
Our labs come with excellent step by step instruction guides. | ![]() |
You have complete control of the virtual environment. Start, stop, pause, reboot, create snapshot etc. |
![]() |
With our iLabs virtualized solution you can restore the system to any state or level you desire. The computing device you are using to perform the labs from is not affected in any way. | ![]() |
The iLabs virtual environment is available to you 24 x 7 anywhere in the world. Just login and start the session. It is that simple. |
Labs For Hacking (CEH)

CEH Labs contain over 80 Gb of Malware, tools, and additional materials delivered in the CEH Training Course. Our iLabs environment has the following Target VM's preconfigured:
Microsoft Windows 2012 Server
Microsoft Windows 8
Microsoft Windows 7
Microsoft Server 2008 R2
Microsoft Server 2003 64 Bit
Microsoft Server 2003 32 Bit
Backtrack
Ubuntu Linux
Target VM's are loaded with vulnerable websites that have mock sensitive information, SQL and XSS vulnerabilities and much more. iLabs also has a set of shared drives with the tools and exercises from the CEH DVD Toolkit preloaded into the isolated environment.
Lab Topics With Step-By-Step Guidance Include:
Foot printing & Reconnaissance
Scanning Networks
Enumeration
System Hacking
Trojans & Backdoors
Viruses & Worms
Sniffers
Social Engineering
Denial of Service
Session Hijacking
Hacking Web servers
Hacking Web Applications
SQL Injection
Evading Firewalls, IDS & Honey pots
Buffer Overflow
Cryptography
Labs For Computer Forensics (CHFI)

Searching and Seizing Computers
Digital Evidence
First Responder Procedures
Understanding Hard Disks and File Systems
Windows Forensics
Data Acquisition and Duplication
Recovering Deleted Files and Deleted Partitions
Forensics Investigating using AccessData FTK
Forensics Investigation Using Encase
Steganography and Image File Forensics
Application Password Crackers
Log Capturing and Event Correlation
Network Forensics, Investigating Logs and Investigating Network Traffic
Investigating Wireless Attacks
Investigating Web Attacks
Tracking Emails and Investigating Email Crimes
Mobile Forensics
Investigative Reports