Directory: Random Listings
4 years Full Time / 5 years Sandwich Course
The Intrusion Prevention training offered by InfoSec Institute covers all areas of intrusion prevention. Host Intrusion Prevention and Network Intrusion Prevention are covered in great detail. You will learn the technical details that make Intrusion Preve ...
ya-wipe is a tool that effectively degausses the surface of a hard disk, making it virtually impossible to retrieve the data that was stored on it. This tool is designed to make sure that sensitive data is completely erased from magnetic media.
Centralized Configuration Management, Tracking, and Reporting for WebThe Secure Email and Web Manager simplifies administration by publishing configurations from a single management console to multiple Cisco web security appliances. You can manage updates ...
Stellar perimeter security and a clear path to the future. Novell BorderManager has been keeping systems secure and employees productive for nearly a decade. And the newly-released Novell BorderManager 3.9 continues this tradition. Like earlier versions, ...
Wide-spectrum: SpamAssassin uses a wide variety of local and network tests to identify spam signatures. This makes it harder for spammers to identify one aspect which they can craft their messages to work around. Free software: it is distributed ...
Kaspersky Mobile Security combines innovative anti-theft defense with advanced Internet threat protection to ensure the safety of your Smartphone. Whether your phone is lost or stolen, or is targeted while you’re surfing the internet, you know your person ...
The Samurai Web Testing Framework is a LiveCD focused on web application testing. We have collected the top testing tools and pre-installed them to build the perfect environment for testing applications.
Hexamail Guard acts as a sentinel for your incoming and outgoing mail. By analyzing each mail received and sent by your organization it intelligently alerts, routes, blocks and audits all email traffic. Features include: Anti-Spam, AntiVirus, Trojan a ...
McAfee VirusScan Enterprise combines anti-virus, anti-spyware, firewall, and intrusion prevention technologies to stop and remove malicious software. It also extends coverage to new security risks and reduces the cost of responding to outbreaks with low i ...
The Five-Year Combined BS/MS Program provides an opportunity for JMU undergraduate students to complete an MS degree in only one additional year of study. Students in this program will complete all requirements of the regular BS degree in Computer Science ...
Install Comodo AntiSpam for free and reclaim your inbox. Our unique Passcode technology authenticates the sender of every mail a system that automated spam bots can't get around. There simply isn't a stronger spam defense available today. A ...
Arkime (formerly Moloch) is an open source, large scale, full packet capturing, indexing and database system. A simple web interface is provided for PCAP browsing, searching, and exporting. APIs are exposed that allow PCAP data and JSON-formatted ses ...
Stormshield Network Security physical firewalls The hardware firewall is a stable and efficient security solution to protect corporate networks from cyber attacks. Real-time protection (intrusion prevention and detection, application control, antivirus, ...
3 years Full Time / 4 years Sandwich Course
Mobile security and complexity don’t have to go hand in hand. Check Point Capsule is one seamless solution that addresses all your mobile security needs. Capsule protects your mobile devices from threats, provides a secure business environment for mobile ...
VSS monitoring's Taps cover both copper and fiber media from T1 to 10Gig. The Taps include the 1X1 series (1 network X 1 monitoring device), 1XN series and also the NX1 series (Tap Switches). The aggregation taps have up to 64MB of memory to buffer traffi ...
HIBUN Data Encryption encrypts data on hard drive, removable media, and file server to protect the secrecy of the information.
The SecurityTube Wi-Fi Security Expert (SWSE) is an online certification for Wi-Fi Security and Penetration Testing. This course is ideal for penetration testers, security enthusiasts and network administrators. The course leading to the certification exa ...
Curuncula is a tool shipped as a loadable kernel module that aims to detect rootkits based on the Intel debugging support facilities. Rootkits that set the GD access flag are also detected. It makes use of the "last branch recording" mechanism provided by ...