List Categories and Listings by C

 Cisco Email Security Appliances defend mission-critical email systems at the gateway. The appliances come ready to plug in and install in the right size for your environment. They are built on the same comprehensive platform that protects the email infr ...

Modified
Presented by Manchester 2600

Continuity is a free security convention open to anyone with a interest in computer security, hacking, phone phreaking, telephony, cryptography, internet security/privacy, urban exploration, social engineering and related subjects. One of our key aims wi ...

ModifiedNever

The relevant topics for this conference include, but are not limited to: Access control, Authentication, Cryptographic Protocols and Applications, Digital Signatures, Disaster Protocols, Hash Functions, Warning Systems Computer/Network Disaster Recovery ...

ModifiedNever
Commercial
Pricing Model

The Computer Security Foundations Symposium is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was c ...

Modified
Commercial
Pricing Model

CPTS has been built upon proven, hands-on Penetration Testing methodologies as utilized by Mile2's international group of specialized consultants. There is an equal emphasis on theoretical and real world experience for effective knowledge transfer to the ...

Category Ethical Hacking
Modified
Net-Security Training
Commercial
Pricing Model

Certified Information Systems Security Professional (CISSP) is a highly sought after course by those who are looking to make a career in Information Security. Our CISSP training course - 'CISSP Fast Track' is an intensive, in-depth training program that h ...

Category CISSP Training
Modified
Foundstone/McAfee
Commercial
Pricing Model

The Foundstone CISSP Prep Course is designed for the security professional that is preparing to take the Certified Information System Professional exam provided by ISC2™. Developed to help those studying for the test gain an understanding of the test, thi ...

Category CISSP Training
Modified
Intense School
Commercial
Pricing Model

Intense School offers this top-notch Boot Camp to train and prepare for the Certified Information Systems Security Professional (CISSP®), the premier security certification created and administered by the International Systems Security Certification Conso ...

Category CISSP Training
Modified
University of Calgary
Commercial
Pricing Model

This course will focus on malicious software, or malware, such as computer viruses, worms, and Trojan horses. Malware techniques will be studied, along with countermeasures and so-called ``benevolent'' forms of malware. Legal and ethical issues will be co ...

Category Virus Training
Modified
PTR Associates, Ltd.

This 3 day instructor led course is task orientated and teaches the skills needed to describe, configure, verify and manage the PIX Firewalls.

ModifiedNever
VPN Dynamics, Inc.

The CSSA Instructor-led Training is designed to reinforce the foundational knowledge in the SonicWALL Technical e*Training courses. These courses provide the hands-on experiential training that will enhance problem solving and provide dynamic feedback in ...

ModifiedNever
Access 2 Networks, Inc.

The Check Point Secure Platform Boot Camp is an intensive 5-day instructor-led course, which introduces the security administrator to Check Point's Secure Platform and Check Point NG. The course provides the information and experience necessary to deploy ...

ModifiedNever
Commercial
Pricing Model

In this instructor-led, lab-intensive course, get the knowledge and skills needed to describe, configure, verify, and manage the Cisco Virtual Private Network (VPN) 3000 Concentrator, Cisco VPN Software Client, and Cisco VPN 3002 Hardware Client feature s ...

Modified
Commercial
Pricing Model

The Configuring Security on the Solaris 10 Operating System course provides students with the knowledge and skills to customize security on Solaris 10 systems.

Modified
Commercial
Pricing Model

The Certified Digital Forensics Examiner program is designed to train Cyber Crime Investigators. Students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while con ...

Modified
New Technologies Inc

The course is ideal for individuals who conduct computer security reviews, computer based internal audits and computer related investigations. The participants in this course typically are employed by government agencies, law enforcement agencies, Fortune ...

ModifiedNever
Key Computer Service, Inc.

The program is designed to be about 70% hands-on and will give you plenty of time to practice and learn the skills necessary to conduct forensic examinations. There are a maximum of 9 students per instructor, so there will be plenty of individual instruct ...

ModifiedNever
New Technologies Inc

The course is ideal for individuals who conduct computer security reviews, computer based internal audits and computer related investigations. The participants in this course typically are employed by government agencies, law enforcement agencies, Fortune ...

ModifiedNever
Risk Analysis Consultants

We offer, as an extension to our standard set of training courses, "Hot-spot workshops" based on your relevant problems. These workshops are oriented to topical problems of digital evidence seizure, documentation, transportation, analysis and interpretati ...

ModifiedNever
TamoSoft, Inc.

CommView is a program for monitoring Internet and Local Area Network (LAN) activity capable of capturing and analyzing network packets. It gathers information about data passing through your dial-up connection or Ethernet card and decodes the analyzed dat ...

ModifiedNever

© Computer Network Defence Limited 2021