Michele M Jordan
Avira Free Antivirus 2015 protects against viruses, malware, and phishing, and the new Dropbox partnership offers secure syncing for your data. In security tests, Avira's latest update continues to deliver top-tier protection.
Malware protection for Windows and Mac. Advanced detection system for preventing novel ransomware and zero-day exploitsComplete web protection for safe online shopping and bankingEnhanced performance to keep your system fast and optimized Web protection ...
CleanMail is the first anti-spam & anti-virus filter, that was designed from the beginning to provide complete email security - protecting you from spam and all kinds of email-borne malware like viruses and phishing mails - while at the same time maki ...
CleanMail is the complete email security package: it protects you from spam and all kinds of email-borne malware like viruses and phishing mails. * Anti-Spam: CleanMail offers a wide range of different antispam filters. It also integrates the award ...
Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is r ...
2 years Full Time
4 years Full Time / 5 years Sandwich Course
The Palo Alto Networks VM-Series comprises three virtualized next-generation firewall models – VM-100, VM-200, and VM-300, supported on VMware ESXi 4.1 and ESXi 5.0 platforms. 2, 4 or 8 CPU cores on the virtualized server platforms can be assign ...
3 years Full Time / 4 years Full Time
3 years Full Time
w3af is a Web Application Attack and Audit Framework. The project's goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. The framework is extended using plugins. For now, think about nessus p ...
Spiceworks! The free “everything IT” network management software. Inventory Your Network Monitor Your Network Run an IT Help Desk Manage Configuration Changes Map Your Network With Spiceworks you can: * Create a network map of your IT network * See networ ...
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and funct ...
SCNR is a modular, distributed, high-performance DAST web application security scanner framework, capable of analyzing the behavior and security of modern web applications and web APIs. It is inspired and built by the more than a decade of experience gat ...
This training course offers a collection of live demonstrations featuring a variety of hacking and defensive techniques used by hackers. Tranchulas online labs are available 24×7 for practising the techniques and tools demonstrated by our instructor durin ...
This training course is a series of educational interactive training sessions where the attendees will gain hands-on experience. They will be able to identify security flaws in web applications customised or built for the training course. They will also b ...
Autopsy is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It is used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recov ...
Hitachi ID Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that ...
Hitachi ID Bravura Privilege secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating st ...
3 years Full Time / 4 years Sandwich Course