Skip to main content

Directory: All Listings 

Results 361 - 380 of 1235 This Category
All Listings
McAfee
Commercial

McAfee Application Control software provides an effective way to block unauthorized applications and code on servers, corporate desktops, and fixed-function devices. This centrally managed whitelisting solution uses a dynamic trust model and innovative se ...

McAfee Application Control
SolarWinds
Commercial

Packed with 49 powerful tools, Engineer’s Toolset delivers the network management, monitoring, and troubleshooting tools you need to easily and effectively manage your infrastructure – all in one extremely affordable package. The toolset includes the SNM ...

Category Network Scanners
Foundstone, Inc.
Commercial

What Will You Learn? For the advanced security engineer, this course is the pinnacle of the Ultimate Hacking series and is a continuation of the Ultimate Hacking: Hands On course. It encompasses such topics as wireless security, SQL injection techniques, ...

Category Ethical Hacking
ISECOM - Institute for Security and Open Methodologies

The premise of the training course is to support the necessary knowledge transfer for a person to be considered a capable, resourceful, and self-sufficient security tester. The training course focuses on the technical skills necessary for security testing ...

Category Ethical Hacking
Orange Cyberdefense
Commercial

An introductory course for those starting the journey into penetration testing or those working in environments where understanding how hackers think and the tools, tactics and techniques they use. The course presents the background information, technical ...

Category Ethical Hacking
Hands-on Hacking Fundamentals
InfoSec Institute
Commercial

Discover vulnerabilities before cybercriminals do! Our most popular information security and hacking training goes in-depth into the techniques used by malicious actors with attention-getting lectures and hands-on labs. Earn your CEH and PenTest+, guaran ...

Category Ethical Hacking
Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+)
Veracode
Commercial

Veracode Discovery helps manage your web attack surface by discovering and inventorying all public-facing applications - inside and outside the IP range - providing a workflow to scan sites for vulnerabilities. Discovery can be used alone to simply di ...

Veracode Web Application Scanning
Leeds Metropolitan University
Open Source

3 years Full Time / 4 years Sandwich Course

Cardwave
Commercial

Enjoy the freedom and flexibility of remote working with the peace of mind that your files will remain safe on your secure USB, even in the event of loss or theft with the SafeToGo® Solo. Prevent unauthorised access – with the device’s AES 256-bit XTS en ...

SafeToGo Solo
SAINT Corporation
Commercial

Before you can secure a network, you have to know how it's threatened. SAINT, or the Security Administrator's Integrated Network Tool, uncovers areas of weakness and recommends fixes. With the SAINT® vulnerability scanner, you can: Identify vulnerabilitie ...

SAINT
Hitachi ID Systems, Inc.
Commercial

Hitachi ID Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that ...

Hitachi ID Bravura Identity
Sheffield Hallam University.
Commercial

The MSc in Information Systems Security has been developed in association with the British Standards Institution (BSI), growing out of successful and popular undergraduate provision, research and developing expertise within the Communications and Networks ...

University of Westminster
Commercial

The Cyber Security and Forensics MSc is is fully certified by the National Cyber Security Centre (NCSC), marking it as a program of national excellence. The course focuses on two key areas: Cyber Security, where you will learn to analyse and mitigate ris ...

University of Glamorgan

This specialist course focuses on the technical aspects of computer system security and systems management. The award is designed to provide up-to-date, relevant and practical information on the technical aspects of computer security. This field is becomi ...

Veracode
Commercial

Veracode Static Analysis provides automated feedback to developers in the IDE and CI/CD pipeline, conducts a full Policy Scan before deployment, and gives clear guidance on how to find, prioritise, and remediate issues. Veracode Static Analysis supports ...

Veracode Static Analysis
Staffordshire University
Open Source

3 years Full Time / 4 years Sandwich Course

Comodo Group
Limited Free Trial

Comodo Internet Security Pro with LivePC Support With Comodo Internet Security Pro, now with Live PC Support you’ll receive our Award-Winning Firewall and features that keep you safe whenever, wherever, and however you use the internet. Your securit ...

IBM Corporation
Commercial

Learn how to set up and administer a Linux(TM)-based firewall.

Wave Systems Corp.
Commercial

Self Encrypting Drives are the most secure, best-performing and most transparent encryption option for protecting data on laptops. These drives automatically encrypt all data written to the drive, so you don’t have to decide what’s important enough to enc ...

Wave Self-Encrypting Drive Management
SANS
Commercial

This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the ...