Skip to main content

Directory: All Listings 

Results 101 - 120 of 1237 This Category
All Listings
7Safe Limited

This is an advanced practical 3 day web hacking training course for penetration testers, security researchers, and security professionals needing to learn the art of security testing web applications. This hands-on course helps the attendees gain in-d ...

CAST Application Security Training

Exports to NetFlow

Foxton Software

Browser History viewer is a free tool for extracting, viewing and analysing internet history from Firefox, Chrome and Internet Explorer web browsers. Website visits are displayed alongside an interactive graph, showing how many sites have been visited ov ...

Category Forensic Tools
Browser History Viewer

The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico ...

The University of Huddersfield

3 years Full Time / 4 years Sandwich Course

Ike-scan is a command-line tool that uses the IKE protocol to discover, fingerprint and test IPSec VPN servers. It is available for Linux, Unix, MacOS and Windows under the GPL license.

Category Network Mapping
Ike-Scan

Parasoft Jtest enables you to accelerate Java software development while minimizing risks introduced into the code, by providing comprehensive analysis, guidance, and tools to get the job done. Jtest integrates with Parasoft DTP for sophisticated reportin ...

Qualys Patch Management is capable of detecting missing patches and deploying patches to all assets whether they're on premises, roaming or remote. Patch Management can be used to patch operating systems as well as 3rd-party applications from a large vari ...

Qualys Patch Management
Webroot Software, Inc.

Webroot Business Endpoint Protection helps businesses keep critical systems, intellectual property, customer data, employees and guests safe from ransomware, phishing, malware and other cyberattacks. Stop sophisticated cyberattacks Next-generation pro ...

Webroot Business Endpoint Protection

With the Clearswift SECURE Email Gateway installed, your organisation can be confident that it is protected from digital threats and data leaks while employees communicate freely by email.Clearswift SECURE Email Gateway Capabilities Policy Controls  ...

Category Guards Mail
Clearswift Secure Email Gateway Virtual Appliance
Turner and Sons Productions Inc.

If2k-Only V2.3.0    Security matters ! Lockout adware, spyware, unauthorized downloads, viruses, p2p activity, pornography, legal liabilities -lockout everything except what you determine you want ! The future of your business will depend upon ...

Category Uncategorised
Internet Filter if2k
De Montfort University

3 years Full Time / 4 years Sandwich Course

Total Defense Inc.

Total Defense Essential Anti-Virus Internet Security Malware protection – simple, smart, and reliable protection from viruses, spyware, ransomware and other malware threats on up to 3 of your PCsMulti-layer technology – real-time and on-demand malware sc ...

Total Defense Anti-Virus
WaveFront Consulting Group

This 4-day course aims to provide web application developers with an understanding of application security issues and attack vectors, and the skills necessary to code defensively against web attacks. We will show how hackers can abuse a web application, ...

Red Hat, Inc

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides ...

The Sophos XG Firewall offers Unified Threat Management (UTM) protections that's easier to manage. Next-Gen Firewall Full Next-Gen Firewall protection with TLS Inspection, IPS, and ATP to stop the latest hacks and attacks. Synchronised Security Your S ...

Category WAF - Appliances
Sophos XG Firewall
SystemWare Europe Ltd

The SystemWare Advanced Receiver Module (SWARM) Travel Case (STC) provides signal acquisition and analysis needs in a compact and portable package. Quick and simple to operate it can scan the RF spectrum from 1 kHz to 3GHz or 6 GHz with the internal recei ...

Argus Systems Group, Inc

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with either UNIX or Linux. Learn how to operate your system in the Ar ...

Kingston University

4 years Full Time

Sheffield Hallam University.

The MSc in Information Systems Security has been developed in association with the British Standards Institution (BSI), growing out of successful and popular undergraduate provision, research and developing expertise within the Communications and Networks ...