Directory: Random Listings
Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...
Bitraser is a certified and secure data erasing software which permanently deletes hard disk data beyond the scope of data recovery. It supports multiple international erasure standards such as DoD 3 passes / 7 passes and NIST.
OpenText EnCase Forensic is a court-proven solution for finding, decrypting, collecting and preserving forensic data from a wide variety of devices, while ensuring evidence integrity and seamlessly integrating investigation workflows. Thorough evidence c ...
A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment.
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, versions on over 1200 servers, and version specific problems on over 270 serv ...
4 years Sandwich Course
Spam messages continuously adapt in order to bypass even the newest protection methods, and that’s why in order to achieve complete efficiency the antispam tools should also be in a continuous adapting process, learning permanently new ways to detec ...
Aker Firewall 5.1 provides the implementation of advanced security measures for corporative networks and systems connected to the Internet: Security, Availability, Reliability and Privacy.
ProxyStrike is an active Web Application Proxy. It's a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced in the pentests of web applications that depends heavily on Javascript, not many web s ...
Synopsys Static Analysis (Coverity) is a fast, accurate and scalable static analysis (SAST) solution that helps development and security teams address security and quality defects early in the software development lifecycle. Track and manage risks ac ...
TCT is a collection of programs by Dan Farmer and Wietse Venema for a post-mortem analysis of a UNIX system after break-in. The software was presented first in a Computer Forensics Analysis class in August 1999 (handouts can be found here). Examples of us ...
Disk Protect is a full disk encryption solution for business, designed to protect data-at-rest held on desktops, laptops, tablets and servers from theft or loss. The solution transparently encrypts device data and uses strong authentication to prevent una ...
edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...
Tripwire File Integrity Monitoring (FIM) has the unique, built-in capability to reduce noise by providing multiple ways of determining low-risk change from high-risk change as part of assessing, prioritizing and reconciling detected change. Auto-promoting ...
Hosted CanIt® automatically protects email from Spam. Ads, fraud schemes, porn, viruses, phishing attempts... if it's junk e-mail, Roaring Penguin's Hosted CanIt will stop it before it reaches your mail server without the need for installing any softw ...
Erase data securely from PCs, laptops, servers and storage environments. This fully automated and centrally managed erasure solution offers cutting edge efficiency and productivity. The most advanced data erasure solution on the market, this next generati ...
3 years Full Time / 4 years Sandwich Course
Cisco IOS NetFlow efficiently provides a key set of services for IP applications, including network traffic accounting, usage-based network billing, network planning, security, Denial of Service monitoring capabilities, and network monitoring. NetFlow pro ...
The bachelor's degree program in computer networks and cybersecurity begins with courses designed to build your foundational IT skills. You'll then focus on the network security side of IT, learning Microsoft and Cisco technologies as well as other cybers ...