Skip to main content

Directory: All Listings 

Results 361 - 380 of 1235 This Category
All Listings
Hitachi Solutions
Commercial

HIBUN Data Encryption encrypts data on hard drive, removable media, and file server to protect the secrecy of the information.

HIBUN Data Encryption
Canterbury Christ Church University
Open Source

3 years Full Time

Ivanti
Limited Free Trial

Reduce risk. Close the application?patching gap. You’re invested in Microsoft Endpoint Configuration Manager and Intune and it’s working for you, helping deliver software and updates to all your workstations. If only it provided more than basic, manual t ...

Ivanti Patch for MEM
ISECOM - Institute for Security and Open Methodologies

The premise of the training course is to support the necessary knowledge transfer for a person to be considered a capable, resourceful, and self-sufficient security tester. The training course focuses on the technical skills necessary for security testing ...

Category Ethical Hacking
Orange Cyberdefense
Commercial

An introductory course for those starting the journey into penetration testing or those working in environments where understanding how hackers think and the tools, tactics and techniques they use. The course presents the background information, technical ...

Category Ethical Hacking
Hands-on Hacking Fundamentals
InfoSec Institute
Commercial

Discover vulnerabilities before cybercriminals do! Our most popular information security and hacking training goes in-depth into the techniques used by malicious actors with attention-getting lectures and hands-on labs. Earn your CEH and PenTest+, guaran ...

Category Ethical Hacking
Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+)
Teramind
Commercial

The weakest link in most systems is invariably the human element. How do you ensure that confidential files do not get uploaded to the cloud?, how can you tell if a disgruntled employee is carrying out malicious activities which compromise the integrity o ...

INVEA-TECH a.s.
Commercial

The FlowMon solution delivers the flow-based (NetFlow/IPFIX) monitoring for all organizations and all networks from 10 Mbps to 10 Gbps. It provides the statistics necessary for network monitoring, security, troubleshooting, IP accounting and billing, capa ...

FlowMon
GamaSec
Limited Free Trial

GamaSec scanner explores the entire Web application environment and registers its structure and contents. Then it mimics actual hacking methods to identify and uncover the details of any point that is vulnerable to an attack including: SQL Injection Atta ...

GamaScan
McAfee (formerly NitroSecurity)
Commercial

The McAfee Application Data Monitor appliance decodes an entire application session to Layer 7, providing a full analysis of everything from the underlying protocols and session integrity all the way up to the contents of the application (such as the text ...

Category Compliance
McAfee Application Data Monitor (Formerly NitroView ADM)
Clearswift
Commercial

The Web Gateway goes beyond simply keeping your network free of viruses, spyware, and other inappropriate content including harmful executables. You decide exactly what content flows, when and to whom. It lets you create secure policies that enable collab ...

Category Guards Web
Clearswift SECURE Web Gateway
Sheffield Hallam University.
Commercial

The MSc in Information Systems Security has been developed in association with the British Standards Institution (BSI), growing out of successful and popular undergraduate provision, research and developing expertise within the Communications and Networks ...

University of Westminster
Commercial

The Cyber Security and Forensics MSc is is fully certified by the National Cyber Security Centre (NCSC), marking it as a program of national excellence. The course focuses on two key areas: Cyber Security, where you will learn to analyse and mitigate ris ...

University of Glamorgan

This specialist course focuses on the technical aspects of computer system security and systems management. The award is designed to provide up-to-date, relevant and practical information on the technical aspects of computer security. This field is becomi ...

Clearswift
Commercial

The Web Gateway goes beyond simply keeping your network free of viruses, spyware, and other inappropriate content including harmful executables. You decide exactly what content flows, when and to whom. It lets you create secure policies that enable collab ...

Category Guards Web
Clearswift SECURE Web Gateway Virtual Appliance
Skipfish
Freeware

A fully automated, active web application security reconnaissance tool. Key features: * High speed: pure C code, highly optimized HTTP handling, minimal CPU footprint - easily achieving 2000 requests per second with responsive targets. * ...

Category Website Scanners
TrustedSec
Open Source

For phishing, SET allows for sending spear-phishing emails as well as running mass mailer campaigns, as well as some more advanced options, such as flagging your message with high importance and adding list of target emails from a file. SET is Python base ...

Lancope
Commercial

The StealthWatch sensor appliance provides fast, accurate monitoring for unexpected or unauthorized network behavior. Using flow-based architecture it provides continuous, real-time network traffic monitoring and instant identification of attack

InfoSec Institute

The Intrusion Prevention training offered by InfoSec Institute covers all areas of intrusion prevention. Host Intrusion Prevention and Network Intrusion Prevention are covered in great detail. You will learn the technical details that make Intrusion Preve ...

SANS
Commercial

This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the ...