Directory: Random Listings
The Annual Computer Security Applications Conference (ACSAC) is an internationally recognized forum where practitioners, researchers, and developers in information and system security meet to learn and to exchange practical ideas and experiences. If you a ...
Strong security starts with a malware-free device. Two eyes are better than one – Emsisoft has combined two powerful antivirus technologies into one lightning-fast scanner. Designed to be as efficient as possible, this dual-engine scanner allows you to de ...
G-Lock SpamCombat uses a set of spam email filters to prevent spam from entering your inbox: Complex Filter, Whitelist, Blacklist, HTML Validator, DNSBL filter, and the Bayesian filter. With our filtering software spam does not even reach your inbox. G-L ...
The weakest link in most systems is invariably the human element. How do you ensure that confidential files do not get uploaded to the cloud?, how can you tell if a disgruntled employee is carrying out malicious activities which compromise the integrity o ...
This course is for those IT professionals who want to master network security. In our course they will learn the best practices to safe-guard their network perimeter. We offer training on using Multi-Vendor firewall products such as Zone Alarm, Smoothwall ...
Learn how to set up and administer a Linux(TM)-based firewall.
2 years Full Time
Content Analysis delivers multi-layer file inspection to better protect your organization against known and unknown threats. Unknown or suspicious content from sources like Proxy, Messaging Gateway, or other tools is delivered to Content Analysis for deep ...
DirX Access is a comprehensive access management and identity federation solution for protecting Web services and Web applications against unauthorized access. User access is controlled and enforced on the basis of central role-based security policies ...
4 years Full Time / 5 years Full Time
Phishing Training Designed for People. Built for Enterprise. Cognitive automation enables individual learning paths that motivate people to recognize and report real attacks. 90% of breaches start with email. Focus your training where it's needed most. ...
Stellar perimeter security and a clear path to the future. Novell BorderManager has been keeping systems secure and employees productive for nearly a decade. And the newly-released Novell BorderManager 3.9 continues this tradition. Like earlier versions, ...
The Cyber Security and Forensics MSc is is fully certified by the National Cyber Security Centre (NCSC), marking it as a program of national excellence. The course focuses on two key areas: Cyber Security, where you will learn to analyse and mitigate ris ...
Blueprinting is a method to remotely find out details about bluetooth-enabled devices. Blueprinting can be used for generating statistics about manufacturers and models and to find out whether there are devices in range that have issues with Bluetooth sec ...
3 years Full Time / 4 years Sandwich Course
For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography tools are used to address digital rights management, protect information, and conceal secrets. From an investigators perspective, inform ...
WSSA examines your website pages, applications and web servers to find security weaknesses and vulnerabilities that would give hackers an opportunity to do damage. Every scan starts by testing the equipment that hosts your site. No matter how carefully c ...
3 years Full Time
DB Audit and Security 360 is a complete out-of-the-box database security & auditing solution for Oracle, Sybase, MySQL, DB2 and MS SQL Server. DB Audit allows database and system administrators, security administrators, auditors and operators to track and ...
NetCure Discovery is a free version of NetCure that autodiscovers your network from layer-2 to layer-7. Use NetCure Discovery to browse and print images of your network topology.