Michele M Jordan

Commercial
Pricing Model

3 day practical computer forensics training course - Learn about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation. Using practical case scenarios, you will be guided through the process ...

Modified
CFIP Certified Forensic Investigation Practitioner
New Net Technologies

NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most compre ...

Modified
Offensive Security
Commercial
Pricing Model

Penetration Testing with Kali (PWK) is a self-paced online pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique pen ...

Category Ethical Hacking
Modified
Penetration Testing with Kali Linux
Commercial
Pricing Model

This certification option is centered on Snort, the industry leading open source intrusion prevention solution. Candidates are assessed on a wide range of criteria that encompasses all the necessary open source components and technical skills for successf ...

Modified
Snort Certified Professional (SnortCP)
INVEA-TECH a.s.
Commercial
Pricing Model

The FlowMon solution delivers the flow-based (NetFlow/IPFIX) monitoring for all organizations and all networks from 10 Mbps to 10 Gbps. It provides the statistics necessary for network monitoring, security, troubleshooting, IP accounting and billing, capa ...

Modified
FlowMon
Nexor Limited
Commercial
Pricing Model

The Nexor Data Diode is an EAL7+* evaluated solution to the information sharing problem by only allowing data transfers in one direction, guaranteeing that no data will leak back from the secure to the less secure network.

Category Data Diodes
Modified
Nexor Data Diode

Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organizations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly s ...

Category Network Scanners
Modified
QualysGuard Vulnerability Management
Sébastien Damaye
Open Source
Pricing Model

Pytbull is a python based flexible IDS/IPS testing framework shipped with more than 300 tests, grouped in 9 modules, covering a large scope of attacks (clientSideAttacks, testRules, badTraffic, fragmentedPackets, multipleFailedLogins, evasionTechniques, s ...

Category IPS Network
Modified
Hosting Armor

HostingArmor scans your server for more than 40,000 vulnerabilities each day - alerting you to the latest security holes in your system. HostingArmor's scanning and reporting technology uses the Nessus scanning engine - an Enterprise class scanner. Our v ...

ModifiedNever
Prolific Solutions

Manage all of your vulnerability data from 3rd party scanners with one console. proVM Auditor ingests data from vulnerability assessment scanners and allows you to perform centralized analysis of all of your findings. The SQL database supports features su ...

Modified
Open Source
Pricing Model

OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...

Modified
OSSIM™ - Open Source SIEM
Dominik Reichl
Freeware
Pricing Model

Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use differ ...

Modified
KeePass Password Safe
SysTools Software

MailXaminer is a comprehensive email examination tool to carry out a thorough analysis of a bunch of emails and its header. With the help of this tool; forensicators can preview more than 20 email file types and perform advanced search operation within th ...

Category Forensic Tools
Modified
MailXaminer
BCC Risk Advisory

edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...

Modified
edgescan
Commercial
Pricing Model

This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the ...

Modified
Juniper Networks
Commercial
Pricing Model

Exports to NetFlow

Modified
Top Layer Networks
COMMERCIAL
Pricing Model

Top Layer's Attack Mitigator? IPS is a family of high performance, ASIC-based intrusion prevention solutions with intelligent blocking and control against the most prevalent cyber attacks. Hybrid attacks such as HTTP worms, DoS / DDoS attacks, protocol an ...

Modified

NetStumbler is a Windows utility for 802.11b based wireless network auditing

Category Wireless Tools
ModifiedNever
Check Point Software Technologies Ltd.
Commercial
Pricing Model

Check Point VPN-1 Pro provides you the most intelligent, reliable security for stopping attacks while simplifying business communications across the Internet. A tightly integrated combination of firewall, VPN and intrusion prevention, VPN-1 Pro is built o ...

Modified
Thomasez@zelow.no
Commercial
Pricing Model

floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Modified