With our strategic partnership with the National CyberWatch Center, we recognize the information technology courses that are a priority for you. We can help you get your certificate or degree program off the ground or improve a current program with our customized virtual labs.
Get a free demo Request instructor access
Infosec Labs by Course
Information Security Fundamentals
- Securing the pfSense Firewall
- Implementing NAT and Allowing Remote Access
- Implementing Common Protocols and Services
- Examining Wireless Networks
- Implementing Security Policies on Windows and Linux
- Data Backups in Windows, BSD, and Linux
- Incident Response Procedures, Forensics, and Forensic Analysis
- Crafting and Deploying Malware Using a Remote Access Trojan (RAT)
- Social Engineering Using SET
- Breaking WEP and WPA and Decrypting the Traffic
- Deep Dive in Packet Analysis - Using Wireshark and Network Miner
- Remote and Local Exploitation
- Patching, Securing Systems, and Configuring Anti-Virus
- Using Active Directory in the Enterprise
- Using Public Key Encryption to Secure Messages
- Securing the pfSense Firewall
- Implementing NAT and Allowing Remote Access
- Implementing Common Protocols and Services
- Examining Wireless Networks
- Implementing Security Policies on Windows and Linux
- Data Backups in Windows, BSD, and Linux
- Incident Response Procedures, Forensics, and Forensic Analysis
- Crafting and Deploying Malware Using a Remote Access Trojan (RAT)
- Social Engineering Using SET
- Breaking WEP and WPA and Decrypting the Traffic
- Deep Dive in Packet Analysis - Using Wireshark and Network Miner
- Remote and Local Exploitation
- Patching, Securing Systems, and Configuring Anti-Virus
- Using Active Directory in the Enterprise
- Using Public Key Encryption to Secure Messages
Ethical Hacking & Systems Defense
- Performing Reconnaissance from the WAN
- Scanning the Network on the LAN
- Enumerating Hosts using Wireshark, Windows, and Linux Commands
- Remote and Local Exploitation
- Crafting and Deploying Malware Using a Remote Access Trojan (RAT)
- Capturing and Analyzing Network Traffic Using a Sniffer
- Social Engineering Using SET
- Performing a Denial of Service Attack from the WAN
- Using Browser Exploitation to Take Over a Host’s Computer
- Attacking Webservers from the WAN
- Exploiting a Vulnerable Web Application
- Performing SQL Injection to Manipulate Tables in a Database
- Breaking WEP and WPA and Decrypting the Traffic
- Attacking the Firewall and Stealing Data over an Encrypted Channel
- Using Public Key Encryption to Secure Messages
- Performing Reconnaissance from the WAN
- Scanning the Network on the LAN
- Enumerating Hosts using Wireshark, Windows, and Linux Commands
- Remote and Local Exploitation
- Crafting and Deploying Malware Using a Remote Access Trojan (RAT)
- Capturing and Analyzing Network Traffic Using a Sniffer
- Social Engineering Using SET
- Performing a Denial of Service Attack from the WAN
- Using Browser Exploitation to Take Over a Host’s Computer
- Attacking Webservers from the WAN
- Exploiting a Vulnerable Web Application
- Performing SQL Injection to Manipulate Tables in a Database
- Breaking WEP and WPA and Decrypting the Traffic
- Attacking the Firewall and Stealing Data over an Encrypted Channel
- Using Public Key Encryption to Secure Messages
Networking Fundamentals
- Configuring Port Redirection
- Implementing NAT and Allowing Remote Access
- IPv4 vs IPv6 – Calculating, Configuring, and Testing
- Network Management
- Business Continuity - Disaster Recovery
- Breaking WEP and WPA and Decrypting the Traffic
- Closing Ports and Unnecessary Services
- Implementing Security Policies on Windows and Linux
- Network Security - Firewalls
- Network Troubleshooting
- TCP/IP Utilities
- The OSI Model
- TCP/IP Protocols - The Core Protocols
- TCP/IP Protocols - Other Key Protocols
- Types of Networks
- Remote Access - RDP
- Configuring Port Redirection
- Implementing NAT and Allowing Remote Access
- IPv4 vs IPv6 – Calculating, Configuring, and Testing
- Network Management
- Business Continuity - Disaster Recovery
- Breaking WEP and WPA and Decrypting the Traffic
- Closing Ports and Unnecessary Services
- Implementing Security Policies on Windows and Linux
- Network Security - Firewalls
- Network Troubleshooting
- TCP/IP Utilities
- The OSI Model
- TCP/IP Protocols - The Core Protocols
- TCP/IP Protocols - Other Key Protocols
- Types of Networks
- Remote Access - RDP
Digital Forensics
- Introduction to File Systems
- Common Locations of Windows Artifacts
- Hashing Data Sets
- Drive Letter Assignments in Linux
- The Imaging Process
- Introduction to Single Purpose Forensic Tools
- Introduction to Autopsy Forensic Browser
- FAT File System
- The NTFS File System
- Browser Artifact Analysis
- Communication Artifacts
- User Profiles and the Windows Registry
- Log Analysis
- Memory Analysis
- Forensic Case Capstone
- Introduction to File Systems
- Common Locations of Windows Artifacts
- Hashing Data Sets
- Drive Letter Assignments in Linux
- The Imaging Process
- Introduction to Single Purpose Forensic Tools
- Introduction to Autopsy Forensic Browser
- FAT File System
- The NTFS File System
- Browser Artifact Analysis
- Communication Artifacts
- User Profiles and the Windows Registry
- Log Analysis
- Memory Analysis
- Forensic Case Capstone
Linux Server I: Linux Fundamentals
- CentOS Server Linux Installation
- Ubuntu Desktop Linux Installation 12.04
- Installing Packages and Shared Libraries on CentOS and Ubuntu
- Displaying Hardware
- Adding a New Partition
- Managing Filesystem Quotas
- Booting and Restarting the System
- Using the BASH Shell - 1
- Using the BASH Shell - 2
- Using the BASH Shell - 3
- Using the BASH Shell - 4
- Monitoring Processes
- Working with Files
- Managing Text Files - 1
- Managing Text Files - 2
- Managing Text Files - 3
- CentOS Server Linux Installation
- Ubuntu Desktop Linux Installation 12.04
- Installing Packages and Shared Libraries on CentOS and Ubuntu
- Displaying Hardware
- Adding a New Partition
- Managing Filesystem Quotas
- Booting and Restarting the System
- Using the BASH Shell - 1
- Using the BASH Shell - 2
- Using the BASH Shell - 3
- Using the BASH Shell - 4
- Monitoring Processes
- Working with Files
- Managing Text Files - 1
- Managing Text Files - 2
- Managing Text Files - 3
Linux Server II: System Administration
- Configuring X Windows in CentOS and Fedora Desktop
- Accessibility Technologies
- User and Group Accounts
- System Administration Tasks - 1
- System Administration Tasks - 2
- System Administration Tasks - 3
- crontab and at
- Configuring Locale and Time Zone Settings
- Working with Email - 1
- Working with Email - 2
- Basic Network Configuration
- Basic Security Administration
- Securing Data with Encryption on a Linux System
- Host Security
- BASH shell features
- BASH Scripting
- Working with a SQL Database
- Configuring X Windows in CentOS and Fedora Desktop
- Accessibility Technologies
- User and Group Accounts
- System Administration Tasks - 1
- System Administration Tasks - 2
- System Administration Tasks - 3
- crontab and at
- Configuring Locale and Time Zone Settings
- Working with Email - 1
- Working with Email - 2
- Basic Network Configuration
- Basic Security Administration
- Securing Data with Encryption on a Linux System
- Host Security
- BASH shell features
- BASH Scripting
- Working with a SQL Database
Scripting Fundamentals
- Advanced Data Structure Usage
- File I/O, String Parsing and Data Structures
- Tuples(Arrays), Error handling and Secure Programming
- Loops
- Math in Python
- Getting Started with Python on Ubuntu - Running from the Command Line
- Introduction to Control Structures and Data Types
- Getting Started with Python on Ubuntu - Writing Your First Program
- Verifying a File Type with its Extension
- Creating a Ping Scanner
- Data Visualization
- Pattern Matching
- Extracting and Cleaning Data Using Python
- Analysis with Kmeans
- Inheritance
- Advanced Data Structure Usage
- File I/O, String Parsing and Data Structures
- Tuples(Arrays), Error handling and Secure Programming
- Loops
- Math in Python
- Getting Started with Python on Ubuntu - Running from the Command Line
- Introduction to Control Structures and Data Types
- Getting Started with Python on Ubuntu - Writing Your First Program
- Verifying a File Type with its Extension
- Creating a Ping Scanner
- Data Visualization
- Pattern Matching
- Extracting and Cleaning Data Using Python
- Analysis with Kmeans
- Inheritance
Network Security Fundamentals
- Configuring a Windows based Firewall to Allow Incoming Traffic
- Configuring a Linux based Firewall to Allow Incoming and Outgoing Traffic
- Implementing Secure DHCP and DNS
- Configuring a Linux based Firewall to Allow Outgoing Traffic
- Configuring Access Control Lists on a Linux Based Firewall
- Configuring a Virtual Private Network with PPTP
- Configuring a Virtual Private Network with OpenVPN
- Implementing RIP, RIPv2, and Securing RIP
- Intrusion Detection using Snort
- Writing Custom Rules
- Host-Based Firewalls
- Configuring RADIUS
- Domain Security
- Configuring a Site to Branch a Virtual Private Network
- Closing Security Holes
- Configuring a Windows based Firewall to Allow Incoming Traffic
- Configuring a Linux based Firewall to Allow Incoming and Outgoing Traffic
- Implementing Secure DHCP and DNS
- Configuring a Linux based Firewall to Allow Outgoing Traffic
- Configuring Access Control Lists on a Linux Based Firewall
- Configuring a Virtual Private Network with PPTP
- Configuring a Virtual Private Network with OpenVPN
- Implementing RIP, RIPv2, and Securing RIP
- Intrusion Detection using Snort
- Writing Custom Rules
- Host-Based Firewalls
- Configuring RADIUS
- Domain Security
- Configuring a Site to Branch a Virtual Private Network
- Closing Security Holes
Linux Based Security +
- Configuring a VPN tunnel using the pfSense Firewall
- Comparing and Contrasting using Clear Text Protocols
- Linux Attack and Response
- Log Analysis of Linux Systems with Grep and Gawk
- Attacking and Defending Linux
- Cracking Passwords on Linux Systems
- Identifying & Analyzing Network Host Intrusion Detection System
- Exploiting Shellshock
- Vulnerability Scanning of a Linux Target
- Encrypting Data using TrueCrypt and Attacking the TrueCypt password using truecrack
- Injection Attacks using WebGoat
- Permissions, Users, and Groups in Linux
- Creating a Proxy Server and an SSL Certificate using the pfSense Firewall
- Steganography
- Configuring a VPN tunnel using the pfSense Firewall
- Comparing and Contrasting using Clear Text Protocols
- Linux Attack and Response
- Log Analysis of Linux Systems with Grep and Gawk
- Attacking and Defending Linux
- Cracking Passwords on Linux Systems
- Identifying & Analyzing Network Host Intrusion Detection System
- Exploiting Shellshock
- Vulnerability Scanning of a Linux Target
- Encrypting Data using TrueCrypt and Attacking the TrueCypt password using truecrack
- Injection Attacks using WebGoat
- Permissions, Users, and Groups in Linux
- Creating a Proxy Server and an SSL Certificate using the pfSense Firewall
- Steganography
Pentesting and Understanding Vulnerabilities
- Provisioning a Web Server
- Exploring HTML
- Provisioning a MySQL Database
- Provisioning PHP
- Dissecting the Login Process
- SQL Injections (SQLi)
- SQLi Vulnerability and Pentesting Steps
- HTML Injections (HTMLi)
- HTMLi Vulnerability and Mitigation
- Reflected XSS
- Reflected XSS Mitigation and URL Encoding
- PHP Sessions and Cookies
- Additional SCRIPT Elements
- Session Stealing (Remote Reflected XSS)
- Remote Reflected XSS Mitigation and URL Encoding
- Vulnerable Forum
- Pentesting the Forum
- Session Stealing (Stored XSS)
- Command Injection
- Stateless Firewall
- Abusing a Stateless Firewall
- Stateful Firewall
- Abusing a Stateful Firewall
- IDS, SYSLOG, and NTP
- Signature Detection and Alerting an Admin
- IPS, SYSLOG, and NTP
- Signature Detection and Remote Shells
- Remote Shell: Embedding Client-side Code into a Package
- Remote Shell Extracting Data
- Incident Response
- Provisioning a Web Server
- Exploring HTML
- Provisioning a MySQL Database
- Provisioning PHP
- Dissecting the Login Process
- SQL Injections (SQLi)
- SQLi Vulnerability and Pentesting Steps
- HTML Injections (HTMLi)
- HTMLi Vulnerability and Mitigation
- Reflected XSS
- Reflected XSS Mitigation and URL Encoding
- PHP Sessions and Cookies
- Additional SCRIPT Elements
- Session Stealing (Remote Reflected XSS)
- Remote Reflected XSS Mitigation and URL Encoding
- Vulnerable Forum
- Pentesting the Forum
- Session Stealing (Stored XSS)
- Command Injection
- Stateless Firewall
- Abusing a Stateless Firewall
- Stateful Firewall
- Abusing a Stateful Firewall
- IDS, SYSLOG, and NTP
- Signature Detection and Alerting an Admin
- IPS, SYSLOG, and NTP
- Signature Detection and Remote Shells
- Remote Shell: Embedding Client-side Code into a Package
- Remote Shell Extracting Data
- Incident Response
Hadoop Administration
- Hadoop 1.2.1
- Map Reduce
- Hadoop 1.2.1 Cluster
- Name Node Failover
- Hadoop 2.7.3
- Hadoop 2.7.3 Cluster
- Hadoop 1.2.1
- Map Reduce
- Hadoop 1.2.1 Cluster
- Name Node Failover
- Hadoop 2.7.3
- Hadoop 2.7.3 Cluster
PC Maintenance and Repair
- Examining PC Hardware
- PC Operating Systems
- Networking Essentials
- Printers
- Security Practices
- Troubleshooting
- Disk Maintenance and Data Recovery
- Command Prompt Tools
- Remote Access
- Control Panel
- Desktop Customization
- Using Active Directory in the Enterprise
- Data Backups in Windows, BSD, and Linux
- Ubuntu Desktop Linux Installation
- Domain Security
- Examining PC Hardware
- PC Operating Systems
- Networking Essentials
- Printers
- Security Practices
- Troubleshooting
- Disk Maintenance and Data Recovery
- Command Prompt Tools
- Remote Access
- Control Panel
- Desktop Customization
- Using Active Directory in the Enterprise
- Data Backups in Windows, BSD, and Linux
- Ubuntu Desktop Linux Installation
- Domain Security
Introduction to Operating Systems
- Introduction to Operating Systems
- Computer Security Basics
- Desktop Virtualization
- Introduction to Windows 7
- Introduction to Windows 8.1
- Introduction to Windows 10
- Supporting and Troubleshooting Windows
- Linux on the Desktop
- Connecting Desktops and Laptops to Networks
- Mobile Operating Systems
- File Management in the Cloud
- Introduction to Operating Systems
- Computer Security Basics
- Desktop Virtualization
- Introduction to Windows 7
- Introduction to Windows 8.1
- Introduction to Windows 10
- Supporting and Troubleshooting Windows
- Linux on the Desktop
- Connecting Desktops and Laptops to Networks
- Mobile Operating Systems
- File Management in the Cloud
Miscellaneous Labs
- Ubuntu Desktop Linux Installation 18.04.1
- Windows Kerberos Exploitation
- Detecting Malware and Unauthorized Devices
- Ubuntu Desktop Linux Installation 18.04.1
- Windows Kerberos Exploitation
- Detecting Malware and Unauthorized Devices
Cybersecurity Attack and Defend
- Creating and Securing User Accounts
- Network Exploitation
- Finding Malicious Indicators
- Static and Dynamic Malware Analysis
- Local Operating System Exploitation
- Investigating a Network Compromise
- Log Analysis in Linux and Splunk
- Network and System Monitoring
- Hardening Windows
- Hardening Linux
- Windows Registry
- Forensic Analysis of Windows Server
- Forensic Analysis of a Windows 10 Client
- Forensic Analysis of a Linux System
- Using EFS
- Using Disk Encryption
- Using SSH and SCP
- Using Hash Functions to Validate Data Integrity
- Creating and Securing User Accounts
- Network Exploitation
- Finding Malicious Indicators
- Static and Dynamic Malware Analysis
- Local Operating System Exploitation
- Investigating a Network Compromise
- Log Analysis in Linux and Splunk
- Network and System Monitoring
- Hardening Windows
- Hardening Linux
- Windows Registry
- Forensic Analysis of Windows Server
- Forensic Analysis of a Windows 10 Client
- Forensic Analysis of a Linux System
- Using EFS
- Using Disk Encryption
- Using SSH and SCP
- Using Hash Functions to Validate Data Integrity
Front End Web Development
- Website Development Basics
- HTML5 Basics I
- HTML5 Basics II
- HTML5 Basics III
- CSS3 Basics I
- CSS3 Basics II
- Building a website
- Introduction to JavaScript
- JavaScript and HTML
- Website Debugging
- Website Development Basics
- HTML5 Basics I
- HTML5 Basics II
- HTML5 Basics III
- CSS3 Basics I
- CSS3 Basics II
- Building a website
- Introduction to JavaScript
- JavaScript and HTML
- Website Debugging