How it Works

Buildng iLabs environment
introduction screen

Welcome to

iLabs

This screen will
present the objective
for your lab

Click Next

Start Lab
You're now ready
to begin your
lab!

Here you'll find
lab content &
instructions

Below you can
use the camera icon
to take screenshots
of your labs

Click this tab
to see the virtual
machines

Here you can
download a lab
manual

slide6

Now that you’ve
got the basics,
you can start
your training!

Click here
for a list of
commands

Follow the directions here
to complete the current step

Click Done
to move on

iLabs available in these Areas

Ethical Hacking Exercises

iLabs Secure Programming Exercises map 100% to the content in our Certified Ethical Hacker Training program.
Click Here to see what is offered under the Ethical Hacking Exercises in iLabs

Computer Forensics

iLabs Computer Forensics Exercises map 100% to content in our Computer Hacking Forensics Investigator Training program.
Click Here to see what is offered under the Computer Forensics Exercises in iLabs

Security Analyst Exercises

iLabs Security Analyst Exercises map 100% to the content in our globally recognized Certified Security Analyst program.
Click Here to see what is offered under the Ethical Hacking Exercises in iLabs

Secure Programming

iLabs Ethical Hacking Exercises map 100% to the content in our globally recognized Certified Ethical Hacker Training program.
Click Here to see what is offered under the Ethical Hacking Exercises in iLabs

Incident Handling Exercises

iLabs Computer Forensics Exercises map 100% to content in our Computer Hacking Forensics Investigator Training program.
Click Here to see what is offered under the Incident Handling Exercises in iLabs