Skip to main content

List Categories and Listings by E

BCC Risk Advisory

edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...

edgescan
Guidance Software, Inc.

With an intuitive, yet flexible GUI, and unmatched performance, EnCase Version 4 provides investigators with the tools to conduct large-scale and complex investigation with accuracy and efficiency. Our award winning solution yields completely non-invasive ...

The Dot Net Factory

An automated and centralized identity management platform is the only viable means for delivering consistent service and maintaining control over application security. As the only Identity Lifecycle Management solution built on a platform that incorporate ...

EmpowerID

OpenText EnCase Forensic is a court-proven solution for finding, decrypting, collecting and preserving forensic data from a wide variety of devices, while ensuring evidence integrity and seamlessly integrating investigation workflows. Thorough evidence c ...

Category Remote Forensics
EnCase Forensic

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the curren ...

Category Ethical Hacking
Paraben Corporation

 E3 Forensic Platform provides processing options for smartphones, computers, cloud data, email, and more. A comprehensive review of data together to find the gaps that hold the keys to your investigation. Universal Data ProcessingData processing in ...

Category Remote Forensics
E3 Forensic Platform

Centrally managed cyber-security for your office workstations, servers and remote workers. Web Protection & Browser SecurityIf a user attempts to access a malicious website, Emsisoft Anti-Malware Home will immediately block the connection and prevent ...

Emsisoft Enterprise Security

Centrally managed cyber-security for your office workstations, servers and remote workers. Emsisoft Business Security in a nutshell Made to protect small and medium sized businesses. Created by the world’s best ransomware experts. Super-fast and low on r ...

Emsisoft Business Security

With the signature Emperor scorpion shape and outline, an industrial grade steel structure, tilting capabilities, integrated audio system, LED lighting and much more, the Emperor is the future of high-end home and office computer work environments. The E ...

Category Geeky Gadgets
Emperor ROS

EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display. It supports Ethernet, F ...

With the signature Emperor scorpion shape and outline, an industrial grade steel structure, tilting capabilities, integrated audio system, LED lighting and much more, the Emperor is the future of high-end home and office computer work environments. The E ...

Category Geeky Gadgets

McAfee Endpoint Protection — Advanced Suite delivers integrated, proactive security that blocks malware and zero-day threats. It protects Windows, Mac, and Linux systems on and off your network. With centralized policy-based management and auditing, Endpo ...

Endpoint Protection — Advanced Suite

Why Edge SWG Defense in Depth Multi-layered inspection built into the proxy foundation--including site categorization and risk scoring, application classification, reputation analysis, anti-malware engines, and sandboxing--helps identify more threats an ...

Category Guards Web
Edge Secure Web Gateway
Magnet Forensics

Encrypted Disk Detector is a command-line tool that can quickly, and non-intrusively, check for encrypted volumes on a computer system during incident response. The decision can then be made to investigate further and determine whether a live acquisition ...

Category Forensic Tools
Encrypted Disk Detector
Northumbria University

4 Years

Coventry University

4 years Sandwich Course

University of Abertay

4 years Full Time

University of Abertay

16 months Full Time

In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build a solid knowledge of the lowest layers of the network. In ...

Category Ethical Hacking
EC-Council Ethical Hacking Core Skills

A tool for techs Emsisoft Commandline Scanner is a console application for professionals who don’t need a graphical user interface. The scanner is included in the following products:Emsisoft Anti-Malware HomeEmsisoft Business SecurityEmsisoft Enterprise ...

Emsisoft Commandline Scanner