Directory: Random Listings
The Certificate in Information Security Management Principles (CISMP) is an internationally recognised qualification which was developed by the British Computer Society and provides a requisite foundation of knowledge necessary for individuals new to the ...
DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal e ...
The Computer Security Foundations Symposium is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was c ...
The vBroker Series provides you with flexible yet advanced network visibility by accessing, optimizing, and delivering traffic from multiple networks to multiple network monitoring and security tools – both passive and active (inline). Featuring both fix ...
Traditionally, IPSec or SSL VPN concentrators have been deployed to serve remote users, adding both cost and complexity. For organizations that have deployed Aruba's campus or branch solutions, the answer is already there – at no additional cost. ...
ImmuniWeb - Web Penetration Testing. ImmuniWeb is a web application security and penetration testing service from High-Tech Bridge. It combines managed vulnerability scanning with manual penetration testing.
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perf ...
The conference will bring together knowledgeable security practitioners and responsible executives from organizations such as computer and network technology providers and manufacturers, digital forensic practitioners, scientific laboratories, law enforce ...
WebMarshal is a Secure Web Gateway - a comprehensive solution which addresses the full spectrum of Web-based security threats as well as the many requirements and issues that arise in managing workplace Internet use. WebMarshal is the answer to managing a ...
Cisco Cloud Web Security (CWS) provides industry-leading security and control for the distributed enterprise. Users are protected everywhere, all the time when using CWS through Cisco worldwide threat intelligence, advanced threat defense capabilities, an ...
Nortel?s VPN Gateway portfolio is a remote access security solution that extends the reach of enterprise applications to remote employees, partners, and customers. By leveraging the native capability of widely deployed SSL enabled Web browsers, while also ...
Endpoint protection, or endpoint security, is a general term that describes cybersecurity services for network endpoints, like laptops, desktops, smartphones, tablets, servers, and virtual environments. These services may include antivirus and antimalware ...
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the curren ...
Keeper is a free and easy to use password management system available on multiple mobile OSs (Android, iOS, WP) and desktop. Keeper allows users enter, organize, and safely store passwords and personal information. There's even a built-in password genera ...
AirMagnet Popular
From planning and deployment to ongoing network troubleshooting, the AirMagnet network tools span the entire WLAN lifecycle.
Nipper accurately audits the security of firewalls, switches and routers to detect exploitable misconfigurations that pose risk to the network, prioritized by criticality. Applying Nipper’s compliance lens to the findings also provides the evidence needed ...
4 years Sandwich Course
3 years Full Time
4 years Sandwich Course
NuFW is an enterprise grade firewall that performs an authentication of every single connection passing through the IP filter, by transparently requesting user?s credentials before any filtering decision is taken. Practically, this means security policies ...