Skip to main content

Michele M Jordan

The Apache Software Foundation

Wide-spectrum: SpamAssassin uses a wide variety of local and network tests to identify spam signatures. This makes it harder for spammers to identify one aspect which they can craft their messages to work around.   Free software: it is distributed ...

Guidance Software, Inc.

With an intuitive, yet flexible GUI, and unmatched performance, EnCase Version 4 provides investigators with the tools to conduct large-scale and complex investigation with accuracy and efficiency. Our award winning solution yields completely non-invasive ...

Check Point Software Technologies Ltd.

Remote Access Client is available for Windows and MacOS. VPN Client VPN Auto-Connect Multi-Factor Authentication Support Secure Hotspot Registration Compliance Scanning Central Management There is also the Capsule Connect product for Android and iOS, a ...

Category VPN Clients
Remote Access Client

Have you ever considered what makes an anti-malware application effective? We at Malwarebytes have created an easy-to-use, simple, and effective anti-malware application. Whether you know it or not your computer is always at risk of becoming infected with ...

OpenText EnCase Forensic is a court-proven solution for finding, decrypting, collecting and preserving forensic data from a wide variety of devices, while ensuring evidence integrity and seamlessly integrating investigation workflows. Thorough evidence c ...

Category Remote Forensics
EnCase Forensic
The Dot Net Factory

An automated and centralized identity management platform is the only viable means for delivering consistent service and maintaining control over application security. As the only Identity Lifecycle Management solution built on a platform that incorporate ...


This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the curren ...

Category Ethical Hacking
Radware Ltd.

DefensePro’s behavior-based, self-learning mechanism proactively scans for anomalous network, server and client traffic patterns. When detecting an attack, DefensePro characterizes the attack’s unique behavior, establishes a real-time signature and create ...

Category IPS Network
Check Point Software Technologies Ltd

Check Point endpoint security includes data security, network security, advanced threat prevention, forensics, endpoint detection and response (EDR), and remote access VPN solutions. To offer simple and flexible security administration, Check Point’s enti ...

Check Point Endpoint Security
Logical Security

The Certified Information Systems Security Professional (CISSP) is a very difficult certification to achieve and is considered a global standard that proves an individual?s proficiency in several different security disciplines. It attests to that person?s ...

Category CISSP Training
Cloudmark Inc.

 Security in the industry for mobile operators, internet service providers, and hosting providers Cloudmark Authority utilizes a unique combination of proprietary technologies including Advanced Message Fingerprinting algorithms and real-time threat ...

Cloudmark Authority
Coventry University

4 years Sandwich Course

Leeds Metropolitan University

3 years Full Time / 4 years Sandwich Course

Staffordshire University

3 years Full Time / 4 years Sandwich Course

Glasgow Caldeonian University

4 years Full Time

University of Abertay

16 months Full Time

De Montfort University

3 years Full Time / 4 years Sandwich Course

University of Plymouth

3 years Full Time / 4 years Full Time

Sheffield Hallam University

4 years Sandwich Course

Staffordshire University

3 years Full Time / 4 years Sandwich Course