Practice Labs - Ethical Hacker v11
Available now

The Ethical Hacker Practice Lab gives users the opportunity to gain hands-on experience of the skills required to perform key ethical hacking procedures.

Ethical hacking (also known as penetration testing) is a simulated cyber attack designed to exploit security vulnerabilities within a network and systems. Individuals conducting ethical hacking locate those vulnerabilities and attempt to exploit them. For example, this might involve breaching web applications, protocols, Application Programming Interfaces (APIs), servers and firewalls, plus anything else on a network that could be open to potential exploitation.

The objective is to identify vulnerabilities that could be targeted by a malicious agent and exploit those vulnerabilities to simulate the damage that might be caused. In the workplace, this intelligence is used to mitigate the effects of a cyber attack and to inform changes to security policies, procedures and infrastructure.

Looking to purchase?

For evaluation access or multi-user pricing please contact your account manager or use the button below to get in touch.

Click buy now to purchase or learn more about our Practice Labs - Ethical Hacker v11 virtual IT lab.

Multi user pricing Buy now

Lab Guides

  • Ethical Hacking and Concepts
  • Foot printing & Reconnaissance of Networking Resources - Part 1
  • Foot printing & Reconnaissance of Networking Resources - Part 2
  • Network Scanning and Host Discovery - Part 1
  • Network Scanning and Host Discovery - Part 2
  • NetBIOS, SNMP & LDAP Network Enumeration
  • NTP, DNS & Other Network Enumeration Techniques & Countermeasures
  • Vulnerability Assessment Tools and Techniques
  • System Hacking & Manipulation
  • Implementing Malware Concepts
  • Network Sniffing Techniques & Attacks
  • Social Engineering Exploits
  • Denial of Services Techniques & Attacks
  • Compromising Web Servers
  • Web Application Exploitation Concepts
  • Web Application Exploitation Attacks - Part 1
  • Web Application Exploitation Attacks - Part 2
  • Conducting SQL Injection Attacks
  • Exploiting Wireless Vulnerabilities
  • Compromising & Exploiting Mobile Devices
  • Compromising IoT & OT platforms
  • Introduction to Cloud Computing Vulnerabilities
  • Cryptographic Concepts, Implementation & Detection

Relevant roles

  • Ethical hacker
  • Security Analyst
  • System Security Administrator
  • Cyber Defense Analyst
  • Information Security Analyst 1
  • Security Analyst L1
  • Security Analyst InfoSec Administrator 
  • Cybersecurity Analyst Level 1, 2 and 3
  • Network Security Engineer
  • SOC Security Analyst
  • Senior Security Analyst.

Learning outcomes

  • Information Security and Ethical Hacking Overview
  • Reconnaissance Techniques
  • System Hacking Phases and Attack Techniques
  • Network and Perimeter Hacking
  • Web Application Hacking
  • Wireless Network Hacking
  • Mobile Platform, IoT, and OT Hacking
  • Cloud Computing
  • Cryptography

What's included

  • 12 months' access to Practice Labs Ethical Hacker v11
  • Access to 5 lab devices
  • 23 bite sized lab guides (topics) to work through
  • Practice exercises with step-by-step instructions to complete
  • A split screen platform where students can read the instructions set and perform the tasks at the same time
  • Multiple choice questions throughout to assess what you have learnt.
  • Screenshot assessment tools
  • 22 hours practical learning time

Lab topology

  • PLABDC01 - (Windows Server 2019 - Domain Server)
  • PLABDM01 - (Windows Server 2019 - Domain Member)
  • PLABWIN10 - (Windows 10 - Workstation)
  • PLABDROID- (Android Device)
  • PLABKALI01 - (Kali 2019.2 - Linux Kali Workstation)
Lab topology diagram