Skip to main content

List Categories and Listings by F

Skybox Security Inc.

Improve cyber hygiene and risk management with centralized, optimized firewall management. Connect and centralizeCentrally manage traditional, next–gen, virtual, and cloud–based firewalls and secure access service edge (SASE) solutions from multiple vend ...

Firewall Assurance

FTK is a digital investigations solution built for speed, stability and ease of use. It quickly locates evidence and forensically collects and analyzes any digital device or system producing, transmitting or storingdata by using a single application from ...

FTK Forensic Toolkit
Special Agent Jesse Kornblum

Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc, or ...

Category Forensic Tools

  With Forcepoint Email Security you can: Identify threatsUse deep content inspection to mitigate advanced malware and ransomware threat. Block data theftUse context-aware DLP to detect data exfiltration using optical character recognition (OCR) i ...

Forcepoint Email Security

F?Secure SAFE protects you against viruses, trojans, and ransom­ware, and secures your online shopping and banking. SAFE secures your online life. Manage your subscription and add protection to your PC, Mac, Android, and iOS devices easily through yo ...

F-Secure SAFE

FIRST conferences promote worldwide coordination and cooperation among Computer Security Incident Response Teams (CSIRTs). The conference provides a forum for sharing goals, ideas, and information on how to improve global computer security. The five-day e ...

Carnegie Mellon SEI

This five-day course is designed for computer security incident response team (CSIRT) technical personnel with little or no incident-handling experience. Through interactive instruction and practical exercises, the course provides insight into the type an ...

Force 10 Networks

Exports to SFlow

FilterGate Ltd.

FilterGate blocks Adult Content, Popups, Banners and Privacy Protection. Ideal for home, school and corporate use. We provide the only product on the market that gives you the ability to eliminate ALL internet clutter including adult content, pop-up and p ...

Category Uncategorised
FilterGate
Manchester Metropolitan University

3 years Full Time

FlowScan analyzes and reports on Internet Protocol (IP) flow data exported by routers. Consisting of Perl scripts and modules, FlowScan binds together (1) a flow collection engine (a patched version of cflowd), (2) a high performance database (Round Robin ...

What Will You Learn? This course will give you an in-depth study of the computer forensics process. Starting from creating evidentiary disk images to recognizing the often-faint trail of unauthorized activity, Foundstone updates this class continuously by ...

The Fox DataDiode helps you to prevent data leakage of classified information, using a one-way connection, while still having access to up-to-date unclassified data such as updates for Anti-Virus or Microsoft Windows. It also prevents unwanted access ...

Category Data Diodes
GlobalNet Training

Gain complete coverage of both SNAF (Securing Networks with ASA Foundation) AND SNAA (Securing Networks with ASA Advanced) with GlobalNet's intensive ASA Specialist 6-Day certification course. In less than one week, you will leave with your Cisco® ASA Spe ...

Staffordshire University

3 years Full Time

Sheffield Hallam University

4 years Sandwich Course

Sheffield Hallam University

1 year Full Time

University of West of England

3 years Full Time / 4 years Sandwich Course

Birmingham City University

3 years Full Time / 4 years Sandwich Course

Canterbury Christ Church University

3 years Full Time