Skip to main content

Directory: All Listings 

Results 41 - 60 of 1235 This Category
All Listings
7Safe Limited
Commercial

This is an advanced practical 3 day web hacking training course for penetration testers, security researchers, and security professionals needing to learn the art of security testing web applications. This hands-on course helps the attendees gain in-d ...

CAST Application Security Training
Sheffield Hallam University.
Commercial

The MSc in Information Systems Security has been developed in association with the British Standards Institution (BSI), growing out of successful and popular undergraduate provision, research and developing expertise within the Communications and Networks ...

mile2
Commercial

Certified Penetration Testing Engineer graduates will obtain real world security knowledge enabling them to recognize vulnerabilities, exploit system weaknesses, and safeguard organizations against threats. Graduates will learn the art of Ethical Hacking ...

Category Ethical Hacking
PTR Associates, Ltd.

This 3 day instructor led course is task orientated and teaches the skills needed to describe, configure, verify and manage the PIX Firewalls.

PTR Associates Ltd

You will learn what the components of Microsoft SQL Server 7 are and understand what the system administrators should be doing. Find out how to get information out of SQL Server and how to interpret it. Experiment with a live SQL Server 7 network in a lab ...

AVG Technologies
Commercial

Essential anti-virus, anti-spyware and anti-spam protection for your email servers. * Unclutter and safeguard your email servers with email server protection Keeps your email servers free from viruses and spam, ensuring the smooth running of your vital em ...

Category Servers
Chinotec Technologies Company
Freeware

We wrote a program called "Paros" for people who need to evaluate the security of their web applications. It is free of charge and completely written in Java. Through Paros's proxy nature, all HTTP and HTTPS data between server and client, including cooki ...

Category Website Scanners
Paros Proxy
GoSecure
Commercial

Multi-Layered Content Filtering and Web Security GoSecure Web Security offers fine-grained content filtering combined with threat detection and mitigation methods to assure powerful protection from Advanced Persistent Threats, including botnets, malware, ...

Category Appliances
Web Security
Cisco
Commercial

Exports to NetFlow

Skipfish
Freeware

A fully automated, active web application security reconnaissance tool. Key features: * High speed: pure C code, highly optimized HTTP handling, minimal CPU footprint - easily achieving 2000 requests per second with responsive targets. * ...

Category Website Scanners
Newcastle College
Open Source

2 years Full Time

Mile2
Commercial

The Certified Digital Forensics Examiner program is designed to train Cyber Crime Investigators. Students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while con ...

Wave Systems Corp.
Commercial

Self Encrypting Drives are the most secure, best-performing and most transparent encryption option for protecting data on laptops. These drives automatically encrypt all data written to the drive, so you don’t have to decide what’s important enough to enc ...

Wave Self-Encrypting Drive Management
SAINT Corporation
Commercial

Before you can secure a network, you have to know how it's threatened. SAINT, or the Security Administrator's Integrated Network Tool, uncovers areas of weakness and recommends fixes. With the SAINT® vulnerability scanner, you can: Identify vulnerabilitie ...

SAINT
SolarWinds
Freeware

SolarWinds’ newest free tool, Real-time NetFlow Analyzer, unlocks the power of NetFlow on your network, empowering you to shutdown the bandwidth hogs and ensure peak performance of your mission-critical network applications. Real-time NetFlow Analyzer cap ...

SolarWinds NetFlow Analyzer
Turner and Sons Productions Inc.
Commercial

If2k-Only V2.3.0    Security matters ! Lockout adware, spyware, unauthorized downloads, viruses, p2p activity, pornography, legal liabilities -lockout everything except what you determine you want ! The future of your business will depend upon ...

Category Uncategorised
Internet Filter if2k
Foundstone, Inc.
Commercial

What Will You Learn? For the advanced security engineer, this course is the pinnacle of the Ultimate Hacking series and is a continuation of the Ultimate Hacking: Hands On course. It encompasses such topics as wireless security, SQL injection techniques, ...

Category Ethical Hacking
Total Defense Inc.
Commercial

Total Defense Essential Anti-Virus Internet Security Malware protection – simple, smart, and reliable protection from viruses, spyware, ransomware and other malware threats on up to 3 of your PCsMulti-layer technology – real-time and on-demand malware sc ...

Total Defense Anti-Virus
Yago Jesus and Patrick Gouin
Open Source

Unhide is a forensic tool to find hidden processes and TCP/UDP ports by rootkits / LKMs or by another hidden technique. // Unhide (ps) Detecting hidden processes. Implements six techniques * Compare /proc vs /bin/ps output * Compare inf ...

Category Forensic Tools
ISECOM - Institute for Security and Open Methodologies

The premise of the training course is to support the necessary knowledge transfer for a person to be considered a capable, resourceful, and self-sufficient security tester. The training course focuses on the technical skills necessary for security testing ...

Category Ethical Hacking