Directory: Random Listings
Georgia Tech has been designated as a "Center of Academic Excellence in Cyber Defense Research" (CAE-R) by the National Security Agency and U.S. Department of Homeland Security. The OMS Cybersecurity program provides the foundations so you can: Underst ...
Comodo Internet Security Pro with LivePC Support With Comodo Internet Security Pro, now with Live PC Support you’ll receive our Award-Winning Firewall and features that keep you safe whenever, wherever, and however you use the internet. Your securit ...
2 years Full Time
NeXpose is an enterprise-level vulnerability assessment and risk management product that identifies security weaknesses in a network computing environment. It offers a comprehensive, one-stop solution for data gathering, reporting and remediation, elimina ...
ContentKeeper is an industry leading Internet content filter that allows organisations to monitor, manage, control & secure staff access to Internet resources. Supplied either as an appliance device or software, ContentKeeper is suitable for Government, C ...
2 years Full Time
The Internet provides a flexible and cost-effective infrastructure for extending the corporate network to all employees and key partners. Yet the Internet also conceals constantly changing threats. To take full advantage of the Internet, you must prevent ...
3 years Full Time / 4 years Sandwich Course
The Palo Alto Networks VM-Series comprises three virtualized next-generation firewall models – VM-100, VM-200, and VM-300, supported on VMware ESXi 4.1 and ESXi 5.0 platforms. 2, 4 or 8 CPU cores on the virtualized server platforms can be assign ...
Wireless technology fundamentally changes accepted security paradigms. With the pervasive deployment of wireless technology, attackers have latched on with sophisticated and effective techniques to exploit wireless systems at work, at home, or on the road ...
Safend Inspector prevents transfer of sensitive company information. As information is processed it is classified and its access permissions and security profile are configured. During data transfer Inspector checks for sensitive information in its c ...
The Windows Identity Foundation helps simplify user access for developers by externalizing user access from applications via claims and reducing development effort with pre-built security logic and integrated .NET tools.
Stenographer is a full-packet-capture utility for buffering packets to disk for intrusion detection and incident response purposes. It provides a high-performance implementation of NIC-to-disk packet writing, handles deleting those files as disk fills up, ...
Tighten security with Firewall as a Service Legacy firewalls can protect the company’s internal perimeter, but they can’t ensure its safety across hybrid clouds. Perimeter 81's Firewall as a Service ensures that only authorized users can connect to your ...
The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico ...
The Samurai Web Testing Framework is a LiveCD focused on web application testing. We have collected the top testing tools and pre-installed them to build the perfect environment for testing applications.
SPF (SpeedPhish Framework) is a python tool designed to allow for quick recon and deployment of simple social engineering phishing exercises. SPF includes many features that allow you to quickly configure and perform effective phishing attacks, including ...
As your business grows and you leverage the Internet to connect customers and partners, your exposure to cyber threats increases. For foolproof network protection that is cost-effective, easily maintained, and remains effective at all times, small busines ...
This training course is a series of educational interactive training sessions where the attendees will gain hands-on experience. They will be able to identify security flaws in web applications customised or built for the training course. They will also b ...
Securing Guest Wifi networks presents unique challenges - unknown/unauthenticated users, varied devices and operating systems, the need for a smooth user experience - all coupled with minimal resources and in-house manpower to manage the solution.