to test drive ilabs - or call us at 1.505.341.3228


iLabs

eccouncil ilabs

Run classroom labs directly from the cloud    

EC-Council iLabs allows students to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.

Our simplistic web portal enables the student to launch an entire range of target machines and access them remotely with one simple click. It is the most cost effective, easy to use, live range lab solution available.


Virtualized Solution

With iLabs, lab exercises can be accessed 24x7 allowing the student to practice skills in a safe, fully functional network anytime it’s convenient.

Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing students to launch a complete Live range open for any form of hacking or testing.

Available target machines are completely virtualized allowing us to control and reset machines quickly and easily with no required instructor or administrative interaction.

The student has 100% control of the environment.

 

 

 
Dynamically access virtual machines using a Web Browser. No plug-ins or additional software required.
 
Access the virtual environment with any device that supports HTML5 such as iPad, iPhone, Android devices
 
Our labs comes with excellent step by step instruction guides
 
You have complete control of the virtual environment. Start, stop, pause, reboot, create snapshot etc.
 
Worried about hacking your own computer? With our iLabs virtualized solution you can restore the system to any state or level you desire.
 
The iLabs virtual environment is available to you 24 x 7 anywhere in the world. Just login and start the session. It is that simple.


 

 





Pre-configured Target Rich Environment

Each lab comes with a complete set of lab exercises for hours of guided, hands-on, practical learning.
Machines are pre-configured with a host of tools and required resources as well as vulnerabilities for evaluation and testing purposes. Targets are not simulated, iLabs is a complete Virtualized environment with fully patched operating systems.

The use of cloud computing and virtualization technology provides the most realistic environment possible with NO simulations or animations.

All machines are fully functioning, live installations of the respective Operating Systems and vulnerabilities.

Pre-configured Target Rich Environment
  

 
         

 

Pre-configured Target Rich Environment

With remote access 24x7, students are able to take concepts learned in Ethical Hacking and Computer Forensics courses and test those concepts with the use of real tools, victim servers, pre-configured vulnerabilities, and much more. Applying concepts learned in the classroom in a controlled, hosted environment provides the ability to learn in real time based on how the systems respond. Through extensive planning and automation services, iLabs is able to provide seamless access to cutting edge content without the need to know or understand Virtualization or Target range development. Students simple login to the online portal and launch their multi-machine environments as needed.

 

 


 How does iLabs work?



 


 
Target Virtual Networks are maintained by EC-Council in an online virtualized platform. When a student logs into iLabs, they are presented with Learning Objectives and Goals. Once receiving a content briefing, they launch the live environment.
 
Within 1 minute, a full target range is booted up in our Cloud environment and the student is provided browser-based access to the platform. All Labs are fully isolated and disconnected from live Internet.
 
The remote viewer that operates through a range of protocols for maximum compatibility, gives the student a Screen view as well as Machine commands for the Virtual Machines.
 
These VM’s are housed inside of a Learning Environment that includes the ability to provide direct guidance, learning objectives, exercises and tasks as well as advanced feedback models like Alerts, Recommendations, Screen Shots and short Video Tutorials.

 

 

 





Labs for hacking

CEH Labs contain over 80 Gb of Malware, tools, and additional materials delivered in the CEH Training Course. Our iLabs environment has the following Target VM’s preconfigured:

  • Microsoft Windows 2012 Server
  • Microsoft Windows 8
  • Microsoft Windows 7
  • Microsoft Server 2008 R2
  • Microsoft Server 2003 64 Bit
  • Microsoft Server 2003 32 Bit
  • Backtrack
  • Ubuntu Linux

Target VM’s are loaded with vulnerable websites such as the Cars and Oldhouse sites that have mock sensitive information, SQL and XSS vulnerabilities and much more. iLabs also has a set of share drives with the tools and exercises from the DVD Toolkit of CEH have been preloaded into the isolated environment.

Lab Topics with step-by-step guidance:

  • Foot printing & Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans & Backdoors
  • Viruses & Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Web servers
  • Hacking Web Applications
  • SQL Injection
  • Evading Firewalls, IDS & Honey pots
  • Buffer Overflow
  • Cryptography

 

 




Labs for Computer Forensics

EC-Council’s Computer Hacking Forensic Investigator (CHFI) Labs are built with the Computer Forensic Investigator in mind. We provide the tools and evidence files required to learn each element of the Computer Forensic process.

Lab topics with step-by-step guidance:

  • Computer Hacking Forensic Investigator Labs
  • Computer Forensics in Today's World
  • Computer Forensics Investigation Process
  • Searching and Seizing Computers
  • Digital Evidence
  • First Responder Procedures
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigating using AccessData FTK
  • Forensics Investigation Using Encase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Tracking Emails and Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports

 

 




iLabs Environment Screenshots


 

 


 

 


 

 


 

 


 

 


 

 




Request More Information

If you like what you have seen so far please contact us to request a quote or a web demo. We want to hear from you to show you how iLabs can start making a difference in your classroom immediately.

Company   :
First Name   :
Last Name   :
Email   :
Phone   :
Street   :
City   :
State   :
Zip Code   :
Country   :
How can we help?   :



Customer Support

When you purchase iLabs subscription we want to be there to help you every step of the way. If you need help please click here to send us a support email and we will respond to your inquiry within 24 hours.

  • Computer Hacking Forensic Investigator Labs
  • Computer Forensics in Today's World
  • Computer Forensics Investigation Process
  • Searching and Seizing Computers
  • Digital Evidence
  • First Responder Procedures
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigating using AccessData FTK
  • Forensics Investigation Using Encase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Tracking Emails and Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports