Lab Icon

    Try Our Labs

    At INE, we help our customers master technical skills in Cybersecurity, Networking, and Cloud by offering high-quality courses and 3100+ no-VPN, browser-based labs. Sign in now and try labs from many of our courses for FREE! No credit card required.

    EVE-NG Networking Labs

    60+ EVE-NG labs enable you to gain entry into a realm of Expert-Designed Topologies tailored to various real-world networking scenarios. Each lab commences with preconfigured topologies and clearly outlined task objectives. Upon completing the lab tasks, learners can delve into comprehensive solutions presented in textual or video format. The unlocked nature of EVE-NG-based labs empowers users to manipulate the existing topology freely, fostering an ideal sandbox environment for crafting entirely new configurations that allow experimentation with an array of networking protocols and features.

    Target Audience: Target Audience: Aspiring Network Architects, Solution Architects and Network Engineers

    GNS3 Networking Labs

    250+ GNS3 labs give you hands-on access to various networking devices from popular vendors. These labs begin with preconfigured topologies and well-defined task objectives. Once the lab tasks are completed, a learner can view detailed solutions for each lab. GNS3-based labs are unlocked, meaning that users can modify the existing topology any way they wish or even use them as a sandbox environment for creating entirely new topologies for experimentation with networking protocols and features.

    Target Audience: Enterprise Network engineers and Network Architects

    Offensive Cybersecurity Labs

    1500+ offensive cybersecurity labs allow users to practice real-world scenarios in a safe environment as an attacker. The labs provide in-browser access to Kali or Windows GUI machines to the user, which can then be used to learn and practice different phases of pentesting and Red teaming (i.e., Reconnaissance, Vulnerability scanning, Exploitation, Post-exploitation). The labs deal with various topics, including Network Security, Web Application Security, Host Security, Reverse Engineering, and Malware Analysis).

    Target Audience: Red Teamers, Penetration Testers, Network Security Engineers and Incident Responders

    Defensive Cybersecurity Labs

    70+ defensive cybersecurity labs allow users to secure infrastructure and services as a Defender. The labs provide in-browser access to Linux or Windows GUI machines to the user. Depending on the lab objective, the user can detect the threats by using monitoring systems (e.g. Wazuh, OSQuery, OSSEC, DeepBlueCLI, Yara, Zeek) and hardening commonly used services (e.g. Docker, Apache, Nginx, PostgreSQL, Squid, WordPress).

    Target Audience: Blue Teamers, Cyber Incident Responders, and Penetration Testers

    CVE Labs

    145+ CVE Labs provide the user with environments containing attacker machine and target machine running a recently discovered real-world CVE (Common Vulnerabilities and Exposures listed on MITRE.org) to practice the exploitation. Aspiring researchers and seasoned experts can leverage these labs to enhance their understanding of CVE, analyze the impact, and devise effective mitigation strategies. The labs also come with a step-by-step exploitation manual with screenshots. Currently, the library contains CVEs reported in popular applications like GitLab, MLFlow, Apache Kafka, WordPress, and many more.

    Target Audience: Security Researchers, Red/Blue Teamers, Penetration Testers and Incident Responders

    Cloud Labs

    200+ Cloud Labs allow users to learn to create, configure, and secure cloud computing resources on the three biggest public cloud platforms (i.e., AWS, GCP, Azure) without the headache of signing up for an account and cleaning up the resources afterward. Depending on the lab objective, the users are provided with Access Credentials to an actual cloud account with no or pre-created resources. This allows the user to focus on the learning without getting distracted by the management of the whole process.

    Target Audience: Cloud Architects, Cloud Security Analysts, Cloud Developers and IT Professionals