
Microsoft Windows Server 2008
Microsoft Windows Server 2008
Application Password Crackers, Buffer Overflow, CHFI v8 Machines, Computer Forensics Exercises, Computer Forensics Investigation Process, Computer Forensics Lab, Cryptography, Data Acquisition and Duplication, Denial of Service, Enumeration VMs, Ethical Hacking Exercises, Footprinting and Reconnaissance, Forensics Investigation Using AccessData FTK, Forensics Investigation Using EnCase, Hacking Web Applications, Hacking Webservers, Hacking Wireless Networks, Investigating Wireless Attacks, Investigative Reports, Log Capturing and Event Correlation, Network Forensics, Investigating Logs and Investigating Network Traffic, Recovering Deleted Files and Deleted Partitions, Scanning Networks, Session Hijacking, Sniffers, Social Engineering, SQL Injection, System Hacking, Tracking Emails and Investigating Email Crimes, Trojans and Backdoors, Understanding Hard Disks and File Systems, Viruses and Worms, Windows Forensics
Back Track 4
CEH v7 Machines
Back Track is the attack platform of choice for many Ethical Hackers and information security professionals. in EC-Council iLabs, Backtrack is provided as a tool rich operating system for leading attacks and exploits.
Ubuntu
Operating Systems
Ubuntu and other Linux platforms are used in a variety of Labs and exercises.

Back Track 5
Back Track 5
Buffer Overflow, CEH v8 Machines, Cryptography, Denial of Service, Ethical Hacking Exercises, Footprinting and Reconnaissance, Hacking Web Applications, Hacking Webservers, Hacking Wireless Networks, Operating Systems, Scanning Networks, Session Hijacking, Sniffers, Social Engineering, SQL Injection, Trojans and Backdoors, Viruses and Worms
Back Track is the attack platform of choice for many Ethical Hackers and information security professionals. in EC-Council iLabs, Backtrack is provided as a tool rich operating system for leading attacks and exploits.

Microsoft Windows 8
Microsoft Windows 8
Buffer Overflow, CEH v8 Machines, Cryptography, Denial of Service, Enumeration VMs, Ethical Hacking Exercises, Evading IDS, Firewalls and Honeypots, Footprinting and Reconnaissance, Hacking Web Applications, Hacking Webservers, Hacking Wireless Networks, Operating Systems, Scanning Networks, Session Hijacking, Sniffers, Social Engineering, SQL Injection, Trojans and Backdoors, Viruses and Worms
Microsoft Windows 8 Desktop is a platform of choice for various EC-Council titles!

Microsoft Windows 7
Microsoft Windows 7
Buffer Overflow, CEH v7 Machines, CEH v8 Machines, CHFI v8 Machines, Computer Forensics Exercises, Cryptography, Data Acquisition and Duplication, Denial of Service, Ethical Hacking Exercises, Footprinting and Reconnaissance, Hacking Web Applications, Hacking Webservers, Hacking Wireless Networks, Log Capturing and Event Correlation, Operating Systems, Scanning Networks, Session Hijacking, Sniffers, Social Engineering, SQL Injection, Trojans and Backdoors, Understanding Hard Disks and File Systems, Viruses and Worms
Microsoft Windows 7 is used across various titles.
Microsoft Windows Server 2003
CEH v7 Machines, CEH v8 Machines, Operating Systems
Microsoft Windows Server 2003 is used across various EC-Council titles. Our environment supports both 32 and 64 bit systems and in many cases, we provide both for various lab activities.

Microsoft Windows Server 2012
Microsoft Windows Server 2012
Buffer Overflow, CEH v8 Machines, Cryptography, Denial of Service, Enumeration VMs, Ethical Hacking Exercises, Evading IDS, Firewalls and Honeypots, Footprinting and Reconnaissance, Hacking Web Applications, Hacking Webservers, Hacking Wireless Networks, Operating Systems, Scanning Networks, Session Hijacking, Sniffers, Social Engineering, SQL Injection, System Hacking, Trojans and Backdoors, Viruses and Worms
Microsoft Windows Server 2012 is used in various exercises across our Ethical Hacking and Computer Forensics labs.