2 day wireless security training course followed by CSWA certification exam (optional). The course follows the evolution of wireless security, teaching the underlying principles so that delegates leave not only with an understanding of the ...
3 day hands-on journey into the hacking mindset, including the CSTA certification exam. Practically apply the tools and techniques that penetration testers use. The course is ideal for network administrators, security officers & crime prevention ...
4 day highly practical course designed to equip information security specialists with the knowledge and skills to deal effectively with incident response situations. It also gives investigators valuable insight into forensic acquisition under di ...
Core Impact is designed to enable security teams to conduct advanced penetration tests with ease. With guided automation and certified exploits, the powerful penetration testing software enables you to safely test your environment using the same technique ...
Internet Security Pro combines the power of COMODO's award-winning Firewall and AntiVirus software to protect your PC from malicious software and Hackers. Removes existing viruses instantly Blocks all unwanted Internet attacks ...
Cisco Adaptive Security Appliance (ASA) Software is the core operating system that powers the Cisco ASA family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual. AS ...
CanSecWest, the world's most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social networking. The conference lasts for three days and ...
Capsa is a portable network analyzer application for both LANs and WLANs which performs real-time packet capturing capability, 24x7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis. Capsa's comprehen ...
3 day practical computer forensics training course - Learn about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation. Using practical case scenarios, you will be guided through the process ...
2-day practical penetration testing course - Build on the knowledge gained in CSTA Ethical Hacking: Hands-On, using the frameworks & tools used by professional penetration testers to: audit & compromise system security, assess weaknesses in w ...
CyberGatekeeper LAN and CyberGatekeeper Remote let systems access the network only after verifying they comply with security policies. If systems are not in compliance or do not participate in the audit, they are kept in a quarantine network. With network ...
This course will give you a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases. ...
Check Point endpoint security includes data security, network security, advanced threat prevention, forensics, endpoint detection and response (EDR), and remote access VPN solutions. To offer simple and flexible security administration, Check Point’s enti ...
Security in the industry for mobile operators, internet service providers, and hosting providers Cloudmark Authority utilizes a unique combination of proprietary technologies including Advanced Message Fingerprinting algorithms and real-time threat ...
The Certified Information Systems Security Professional (CISSP) is a very difficult certification to achieve and is considered a global standard that proves an individual?s proficiency in several different security disciplines. It attests to that person?s ...
The Cisco FirePOWER Next-Generation IPS (NGIPS) solution integrates: Real-time contextual awareness Intelligent security automation Superior performance with industry-leading network intrusion prevention Cisco FirePOWER NGIPS features ...
CERTStation provides tools enabling users to receive actionable security intelligence in a meaningful and timely manner. We are dedicated to providing a comprehensive enterprise view of global security information to enable our users to apply it instantly ...
Immunity's CANVAS makes available hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework to penetration testers and security professionals
The carwhisperer project intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.
Cisco IOS Firewall is a security-specific option for Cisco IOS Software that integrates robust firewall functionality and intrusion detection for every network perimeter. It adds greater depth and flexibility to existing Cisco IOS Security solutions?such ...
© Computer Network Defence Limited 2023