Directory: Random Listings
Dante is a circuit-level firewall/proxy that can be used to provide convenient and secure network connectivity to a wide range of hosts while requiring only the server Dante runs on to have external network connectivity. Once installed, Dante can in most ...
DirX Identity offers an extensive identity management solution for enterprises and organizations. It gives the right people the right access to the right resources at the right time and thus leads to productivity, information security, a perceptible reduc ...
ECLAIR is a general platform for software verification. Applications range from coding rule validation, to automatic generation of testcases, to the proof of absence of run-time errors or generation of counterexamples, and to the specification of code mat ...
Device discovery Track assets scattered across your entire enterprise. Gather a complete and accurate view of all network endpoints, including managed and unmanaged devices, and authorized and unauthorized devices. Understand what types of devices are on ...
HIBUN Data Encryption encrypts data on hard drive, removable media, and file server to protect the secrecy of the information.
Websecurify is a powerful web application security testing platform designed from the ground up to provide the best combination of automatic and manual vulnerability testing technologies. Some of the main features of Websecurify include: Availab ...
OverviewIntercept X for Mobile protects your Android device without compromising performance or battery life. Real-time synchronization with SophosLabs ensures that your mobile device is always protected from the latest malware and online threats – just l ...
EdenWall is the hardware firewall developed by INL. It provides authentication and user-based network flow management. Thanks to EdenWall, network filtering policies based on actual user identity is now possible. Sole IP-based filtering time is over! ...
4 years Full Time / 3 years Full Time
The processes and methodologies taught in this class will train you to collect an image on damaged evidence where standard forensic imaging would have failed. You will learn to understand what kinds of problems hard drives have and what your options are t ...
The fully assembled and enclosed brother to the Throwing Star LAN Tap Kit. The pro model sports all of the same 10BASET and 100BASETX monitoring goodness ready to go in your kit bag, no soldering necessary. To a target network this little guy looks just ...
RVAsec is the first Richmond, VA based security convention that showcases local talent as well as brings the best speakers to the midatlantic region. RVAsec attracts over 400 security professionals from across the country. The conference is dual-track a ...
SEC504 helps you develop the skills to conduct incident response investigations. You will learn how to apply a dynamic incident response process to evolving cyber threats, and how to develop threat intelligence to mount effective defense strategies for cl ...
Zoho Vault offers a robust free plan for individuals, with easy-to-use unlimited password storage, and flexible business plans for teams. Powerful security dashboards Get clear security insights into both your personal and business passwords. Identify a ...
A content filter monitors the use of a computer. With the help of content filter software, you decide which websites can and cannot be accessed, or which applications can be run. Content filters are popular with parents who want to make sure that their ch ...
The GB-2000X Firewall Appliance's powerful hardware design meets the needs of SME corporations with complex Internet connectivity and heavy network traffic demands. GTA's GB-2000X Firewall Appliance provides powerful, enterprise-level security with compre ...
The Stealth SM2020 is the most advanced portable speech protection system which protects you against listening and recording devices. The Stealth SM2020 creates sound barrier interference which masks your speech and any sound to be extremely difficult or ...
NCP Secure Enterprise Server is the central dial-up platform for a company with external terminals and systems. It is the tunnel endpoint for all mobile and stationary teleworkers as well as remote VPN gateways, for example, in subsidiaries. NCP Secure En ...
4 years Full Time
This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Metasploit Basics and Framework Organization Server and Client Side Exploitation Meterpreter – Exte ...