Skip to main content

Directory: All Listings 

Results 181 - 200 of 1235 This Category
All Listings
curt@idontwanttowork.com
Freeware

Use this service to test your firewall rules. If you intend to allow or deny connections through your firewall, you can check to see what will happen when an Internet user attempts to connect. Behind the scenes, this firewall test uses NMap to attempt to ...

mile2
Commercial

Certified Penetration Testing Engineer graduates will obtain real world security knowledge enabling them to recognize vulnerabilities, exploit system weaknesses, and safeguard organizations against threats. Graduates will learn the art of Ethical Hacking ...

Category Ethical Hacking
University of Westminster
Open Source

Cyber Security and Forensics BSc is designed to meet the ever-growing requirements and challenges facing businesses, governments and individuals. The course brings together a mix of several disciplines and provides the fundamental skills needed for a suc ...

F5 Networks, Inc,
Commercial

Protect your apps with behavioural analytics, proactive bot defence, and application-layer encryption of sensitive data. Advanced App Protection Advanced WAF combines machine learning, threat intelligence and deep application expertise.  Proactive ...

Category WAF - Appliances
Advanced Web Application Firewall
SANS
Commercial

SEC542 enables students to assess a web application's security posture and convincingly demonstrate the business impact should attackers exploit the discovered vulnerabilities. You will practice the art of exploiting web applications to find flaws in your ...

Web App Penetration Testing and Ethical Hacking: SEC542
Broadcom
Commercial

Defeat business email compromise using advanced heuristics, BEC scam analysis, sender authentication enforcement & controls, and domain intelligence to help block typo squatting and identity spoofing.Protect your brand reputation by using automation t ...

Category Enterprise
Messaging Gateway

srm

elleron
GPL

srm is a secure replacement for rm(1). Unlike the standard rm, it overwrites the data in the target files before unlinking them. This prevents command-line recovery of the data by examining the raw block device. It may also help frustrate physical examina ...

Kobelt Development Inc.
Commercial

Netsentron uses a quadruple filtering system to prevent threatening content, images and pages from loading on your computer, while allowing content you have predetermined as safe to pass through. You are in control of deciding which pages your organizatio ...

Category Guards Web
NetSentron
coresecurity by HelpSystems
Commercial

Core Network Insight provides network traffic analysis to reveal critical threats in real time on any device within your infrastructure. Multiple detection engines provide definitive evidence and pinpoint the specific location of an infection, enabling se ...

Core Network Insight
NetIQ
Commercial

NetIQ Secure Configuration Manager audits system configurations and compares them to corporate policies, previous snapshots, and/or other systems. It also leverages this configuration information to reliably identify vulnerabilities and exposures, using t ...

Category Host IDS
NetIQ Secure Configuration Manager
Cisco
Commercial

Cisco IOS NetFlow efficiently provides a key set of services for IP applications, including network traffic accounting, usage-based network billing, network planning, security, Denial of Service monitoring capabilities, and network monitoring. NetFlow pro ...

No Vendor
Commercial

The theme of the conference is the protection of computer networks. The conference will draw participants from academia and industry in Europe and beyond to discuss hot topics in applied network and systems security. Topics include but are not limited to ...

Subgraph
Open Source

Vega is a GUI-based, multi-platform (OS X, Linux, Windows), free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes a ...

Category Website Scanners
Vega
Beyond Security
Service

WSSA examines your website pages, applications and web servers to find security weaknesses and vulnerabilities that would give hackers an opportunity to do damage. Every scan starts by testing the equipment that hosts your site. No matter how carefully c ...

Web Site Security Audit
Arne Vidstrom
FREEWARE

PMDump is a tool that lets you dump the memory contents of a process to a file without stopping the process. This can be useful in a forensic investigation.

Category Forensic Tools
Costa Tsaousis
Free

FireHOL is an iptables firewall generator producing stateful iptables packet filtering firewalls, on Linux hosts and routers with any number of network interfaces, any number of routes, any number of services served, any number of complexity between varia ...

BCS - Chartered Institute for IT
Commercial

The Certificate in Information Security Management Principles (CISMP) is an internationally recognised qualification which was developed by the British Computer Society and provides a requisite foundation of knowledge necessary for individuals new to the ...

NetIQ
Commercial

NetIQ Change Guardian for Group Policy minimizes the risks associated with Group Policy Object (GPO) change management and helps determine and document all authorized and unauthorized Group Policy changes to the live environment. Group Policy is an ext ...

Category Host IDS
NetIQ Change Guardian for Group Policy
Manage Engine
Commercial

NetFlow Analyzer, a complete traffic analytics tool, that leverages flow technologies to provide real time visibility into the network bandwidth performance. NetFlow Analyzer is a unified solution that collects, analyzes and reports about what your networ ...

NetFlow Analyzer
German Informatics Society
Commercial

In order to advance the fields of IT-Incident Management and Forensics the special interest-group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) organises an annual conference, bringing together experts from thr ...