Skip to main content

Directory: All Listings 

Results 381 - 400 of 1235 This Category
All Listings
SANS
Commercial

This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the ...

SP Hailey Enterprises

Packet Analysis and Intrusion Detection 5 Day You'll learn how to properly read and interpret packets and packet headers including IP, TCP, ICMP, and UDP. You will learn how to distinguish between normal, abnormal, and malicious traffic. You will also c ...

InfoSec Institute

The Intrusion Prevention training offered by InfoSec Institute covers all areas of intrusion prevention. Host Intrusion Prevention and Network Intrusion Prevention are covered in great detail. You will learn the technical details that make Intrusion Preve ...

Infoexpress, Inc.
Commercial

Know and control your network with Easy NAC, the simple and affordable Network Access Control solution. Easy NAC automatically discovers devices, profiles them, and controls access to the network. Easy NAC’s unique technology requires no network changes ...

Easy NAC
Barracuda
Commercial

The Barracuda Firewall provides extensive application control and user identity functions in an easy-to-use solution. This firewall is optimised for bandwidth-sensitive tasks like packet forwarding and routing layer 7 applications, Intrusion Prevention (I ...

Barracuda Firewall
Oracle
Freeware

Oracle Directory Server Enterprise Edition (formerly SUN Directory Server Enterprise Edition) is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it ...

Viasat
Commercial

The Viasat Eclypt Core encrypted internal hard drive protects data at rest in commercial-off-the-shelf (COTS) laptop and desktop computers in enterprise and tactical environments, as well as data stored in vehicles, aircraft, and ships. During high-risk o ...

Eclypt Core Encrypted Internal Hard Drive
Cisco
Commercial

In zero-trust architecture, ISE is the policy decision point. It gathers intel from the stack to authenticate users and endpoints, automatically containing threats. ?Harness the power of resilience? ?Resilience begins with secure connections. ISE helps ...

Cisco Identity Services Engine
PTR Associates, Ltd.

This 3 day instructor led course is task orientated and teaches the skills needed to describe, configure, verify and manage the PIX Firewalls.

VPN Dynamics, Inc.

The CSSA Instructor-led Training is designed to reinforce the foundational knowledge in the SonicWALL Technical e*Training courses. These courses provide the hands-on experiential training that will enhance problem solving and provide dynamic feedback in ...

Access 2 Networks, Inc.

The Check Point Secure Platform Boot Camp is an intensive 5-day instructor-led course, which introduces the security administrator to Check Point's Secure Platform and Check Point NG. The course provides the information and experience necessary to deploy ...

Webroot
Commercial

The BrightCloud Mobile Security SDK for Android™ and iOS® addresses mobile device vulnerabilities by enabling mobile management partners to offer enhanced security for their customers. It features antivirus, antimalware, device and application interrogati ...

Category Mobile Devices
Coventry University
Open Source

4 years Sandwich Course

University of Plymouth
Open Source

3 years Full Time / 4 years Full Time

Magnet Forensics
Freeware

Encrypted Disk Detector is a command-line tool that can quickly, and non-intrusively, check for encrypted volumes on a computer system during incident response. The decision can then be made to investigate further and determine whether a live acquisition ...

Category Forensic Tools
Encrypted Disk Detector
Microsoft
Commercial

Microsoft Defender is simplified online security that meets you and your family where you are by bringing multiple protections together into a single dashboard. It provides online protection across the devices you and your family use. It offers tips and r ...

Microsoft Defender
Red Hat, Inc
Commercial

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides ...

Microdev
Commercial

This intermediate course is intended for administrators and support personnel who wish to learn the key skills required to implement security on Linux installations. As more servers on the network move to the Linux operating system, security becomes an in ...

Leading Edge Business Solutions (Pty) Ltd

Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...

University of Abertay
Open Source

4 years Full Time