Skip to main content

Schools

Elevate any training program with hands-on Infosec Labs

If you currently offer or have always wanted to offer various certificate or degree programs in cyber and information security that integrates a customized, hands-on virtual lab experience for real-world skills readiness--look no further. 

  • Full LTI integrations with your school or company’s LMS.
  • Best in breed labs that can be instantly added to any course or program.
  • Ability to work with or without access codes.
  • Auto assessment tool that eliminates the need for instructors to grade labs.
  • Fastest and most scalable platform currently serving over 140 schools.

infosec challn=enge

With our strategic partnership with the National CyberWatch Center, we recognize the information technology courses that are a priority for you. We can help you get your certificate or degree program off the ground or improve a current program with our customized virtual labs.

Get a free demo    Request instructor access

 

Infosec Labs by Course

Information Security Fundamentals

  1. Securing the pfSense Firewall
  2. Implementing NAT and Allowing Remote Access
  3. Implementing Common Protocols and Services
  4. Examining Wireless Networks
  5. Implementing Security Policies on Windows and Linux
  6. Data Backups in Windows, BSD, and Linux
  7. Incident Response Procedures, Forensics, and Forensic Analysis
  8. Crafting and Deploying Malware Using a Remote Access Trojan (RAT)
  9. Social Engineering Using SET
  10. Breaking WEP and WPA and Decrypting the Traffic
  11. Deep Dive in Packet Analysis - Using Wireshark and Network Miner
  12. Remote and Local Exploitation
  13. Patching, Securing Systems, and Configuring Anti-Virus
  14. Using Active Directory in the Enterprise
  15. Using Public Key Encryption to Secure Messages

Ethical Hacking & Systems Defense

  1. Performing Reconnaissance from the WAN
  2. Scanning the Network on the LAN
  3. Enumerating Hosts using Wireshark, Windows, and Linux Commands
  4. Remote and Local Exploitation
  5. Crafting and Deploying Malware Using a Remote Access Trojan (RAT)
  6. Capturing and Analyzing Network Traffic Using a Sniffer
  7. Social Engineering Using SET
  8. Performing a Denial of Service Attack from the WAN
  9. Using Browser Exploitation to Take Over a Host’s Computer
  10. Attacking Webservers from the WAN
  11. Exploiting a Vulnerable Web Application
  12. Performing SQL Injection to Manipulate Tables in a Database
  13. Breaking WEP and WPA and Decrypting the Traffic
  14. Attacking the Firewall and Stealing Data over an Encrypted Channel
  15. Using Public Key Encryption to Secure Messages

Networking Fundamentals

  1. Configuring Port Redirection
  2. Implementing NAT and Allowing Remote Access
  3. IPv4 vs IPv6 – Calculating, Configuring, and Testing
  4. Network Management
  5. Business Continuity - Disaster Recovery
  6. Breaking WEP and WPA and Decrypting the Traffic
  7. Closing Ports and Unnecessary Services
  8. Implementing Security Policies on Windows and Linux
  9. Network Security - Firewalls
  10. Network Troubleshooting
  11. TCP/IP Utilities
  12. The OSI Model
  13. TCP/IP Protocols - The Core Protocols
  14. TCP/IP Protocols - Other Key Protocols
  15. Types of Networks
  16. Remote Access - RDP

Digital Forensics

  1. Introduction to File Systems
  2. Common Locations of Windows Artifacts
  3. Hashing Data Sets
  4. Drive Letter Assignments in Linux
  5. The Imaging Process
  6. Introduction to Single Purpose Forensic Tools
  7. Introduction to Autopsy Forensic Browser
  8. FAT File System
  9. The NTFS File System
  10. Browser Artifact Analysis
  11. Communication Artifacts
  12. User Profiles and the Windows Registry
  13. Log Analysis
  14. Memory Analysis
  15. Forensic Case Capstone

Linux Server I: Linux Fundamentals

  1. CentOS Server Linux Installation
  2. Ubuntu Desktop Linux Installation 12.04
  3. Installing Packages and Shared Libraries on CentOS and Ubuntu
  4. Displaying Hardware
  5. Adding a New Partition
  6. Managing Filesystem Quotas
  7. Booting and Restarting the System
  8. Using the BASH Shell - 1
  9. Using the BASH Shell - 2
  10. Using the BASH Shell - 3
  11. Using the BASH Shell - 4
  12. Monitoring Processes
  13. Working with Files
  14. Managing Text Files - 1
  15. Managing Text Files - 2
  16. Managing Text Files - 3

Linux Server II: System Administration

  1. Configuring X Windows in CentOS and Fedora Desktop
  2. Accessibility Technologies
  3. User and Group Accounts
  4. System Administration Tasks - 1
  5. System Administration Tasks - 2
  6. System Administration Tasks - 3
  7. crontab and at
  8. Configuring Locale and Time Zone Settings
  9. Working with Email - 1 
  10. Working with Email - 2
  11. Basic Network Configuration
  12. Basic Security Administration
  13. Securing Data with Encryption on a Linux System
  14. Host Security
  15. BASH shell features
  16. BASH Scripting
  17. Working with a SQL Database

Scripting Fundamentals

  1. Advanced Data Structure Usage
  2. File I/O, String Parsing and Data Structures
  3. Tuples(Arrays), Error handling and Secure Programming
  4. Loops
  5. Math in Python
  6. Getting Started with Python on Ubuntu - Running from the Command Line
  7. Introduction to Control Structures and Data Types
  8. Getting Started with Python on Ubuntu - Writing Your First Program
  9. Verifying a File Type with its Extension
  10. Creating a Ping Scanner
  11. Data Visualization
  12. Pattern Matching
  13. Extracting and Cleaning Data Using Python
  14. Analysis with Kmeans
  15. Inheritance

Network Security Fundamentals

  1. Configuring a Windows based Firewall to Allow Incoming Traffic
  2. Configuring a Linux based Firewall to Allow Incoming and Outgoing Traffic
  3. Implementing Secure DHCP and DNS
  4. Configuring a Linux based Firewall to Allow Outgoing Traffic
  5. Configuring Access Control Lists on a Linux Based Firewall
  6. Configuring a Virtual Private Network with PPTP
  7. Configuring a Virtual Private Network with OpenVPN
  8. Implementing RIP, RIPv2, and Securing RIP
  9. Intrusion Detection using Snort
  10. Writing Custom Rules
  11. Host-Based Firewalls
  12. Configuring RADIUS
  13. Domain Security
  14. Configuring a Site to Branch a Virtual Private Network
  15. Closing Security Holes

Linux Based Security +

  1. Configuring a VPN tunnel using the pfSense Firewall
  2. Comparing and Contrasting using Clear Text Protocols
  3. Linux Attack and Response
  4. Log Analysis of Linux Systems with Grep and Gawk
  5. Attacking and Defending Linux
  6. Cracking Passwords on Linux Systems
  7. Identifying & Analyzing Network Host Intrusion Detection System
  8. Exploiting Shellshock
  9. Vulnerability Scanning of a Linux Target
  10. Encrypting Data using TrueCrypt and Attacking  the TrueCypt password using truecrack
  11. Injection Attacks using WebGoat
  12. Permissions, Users, and Groups in Linux
  13. Creating a Proxy Server and an SSL Certificate using the pfSense Firewall
  14. Steganography 

Pentesting and Understanding Vulnerabilities

  1. Provisioning a Web Server 
  2. Exploring HTML
  3. Provisioning a MySQL Database 
  4. Provisioning PHP 
  5. Dissecting the Login Process
  6. SQL Injections (SQLi) 
  7. SQLi Vulnerability and Pentesting Steps
  8. HTML Injections (HTMLi)
  9. HTMLi Vulnerability and Mitigation 
  10. Reflected XSS 
  11. Reflected XSS Mitigation and URL Encoding 
  12. PHP Sessions and Cookies 
  13. Additional SCRIPT Elements
  14. Session Stealing (Remote Reflected XSS) 
  15. Remote Reflected XSS Mitigation and URL Encoding
  16. Vulnerable Forum
  17. Pentesting the Forum
  18. Session Stealing (Stored XSS)
  19. Command Injection
  20. Stateless Firewall 
  21. Abusing a Stateless Firewall 
  22. Stateful Firewall
  23. Abusing a Stateful Firewall
  24. IDS, SYSLOG, and NTP
  25. Signature Detection and Alerting an Admin
  26. IPS, SYSLOG, and NTP
  27. Signature Detection and Remote Shells
  28. Remote Shell: Embedding Client-side Code into a Package
  29. Remote Shell Extracting Data
  30. Incident Response

Hadoop Administration

  1. Hadoop 1.2.1
  2. Map Reduce
  3. Hadoop 1.2.1 Cluster
  4. Name Node Failover
  5. Hadoop 2.7.3
  6. Hadoop 2.7.3 Cluster

PC Maintenance and Repair

  1. Examining PC Hardware
  2. PC Operating Systems
  3. Networking Essentials
  4. Printers
  5. Security Practices
  6. Troubleshooting
  7. Disk Maintenance and Data Recovery
  8. Command Prompt Tools
  9. Remote Access
  10. Control Panel
  11. Desktop Customization
  12. Using Active Directory in the Enterprise
  13. Data Backups in Windows, BSD, and Linux
  14. Ubuntu Desktop Linux Installation
  15. Domain Security

Introduction to Operating Systems

  1. Introduction to Operating Systems
  2. Computer Security Basics 
  3. Desktop Virtualization 
  4. Introduction to Windows 7 
  5. Introduction to Windows 8.1 
  6. Introduction to Windows 10 
  7. Supporting and Troubleshooting Windows 
  8. Linux on the Desktop 
  9. Connecting Desktops and Laptops to Networks 
  10. Mobile Operating Systems
  11. File Management in the Cloud

Miscellaneous Labs

  1. Ubuntu Desktop Linux Installation 18.04.1
  2. Windows Kerberos Exploitation
  3. Detecting Malware and Unauthorized Devices

Cybersecurity Attack and Defend

  1. Creating and Securing User Accounts 
  2. Network Exploitation
  3. Finding Malicious Indicators
  4. Static and Dynamic Malware Analysis
  5. Local Operating System Exploitation 
  6. Investigating a Network Compromise
  7. Log Analysis in Linux and Splunk
  8. Network and System Monitoring
  9. Hardening Windows
  10. Hardening Linux
  11. Windows Registry
  12. Forensic Analysis of Windows Server
  13. Forensic Analysis of a Windows 10 Client
  14. Forensic Analysis of a Linux System
  15. Using EFS
  16. Using Disk Encryption
  17. Using SSH and SCP
  18. Using Hash Functions to Validate Data Integrity

Front End Web Development

  1. Website Development Basics
  2. HTML5 Basics I
  3. HTML5 Basics II
  4. HTML5 Basics III
  5. CSS3 Basics I
  6. CSS3 Basics II
  7. Building a website
  8. Introduction to JavaScript
  9. JavaScript and HTML
  10. Website Debugging

Who We Work For

waketech logo

oregon tech

Marshall University

Louisville Cardinals

University of Delaware

brown univ

college

site

national univ

Bluefield College

Cybrary