Skip to main content

Michele M Jordan

Welcome to the largest underground hacking event in the world. DefCon hosts lots of small, regional meetings, and a DefCon event that coincides with the Black Hat Briefings in Las Vegas.

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

University of Glamorgan

This specialist course focuses on the technical aspects of computer system security and systems management. The award is designed to provide up-to-date, relevant and practical information on the technical aspects of computer security. This field is becomi ...

Capsa Popular

Capsa is a portable network analyzer application for both LANs and WLANs which performs real-time packet capturing capability, 24x7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis. Capsa's comprehen ...

Formerly Ethereal. Wireshark is the world's foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries, Features Include: Deep inspection of hundreds of protocols, with more being added all the time L ...

NetSweeper, Inc.

A complete solution deployed in the cloud or on-premise, with carrier-grade performance and reliability Dynamic CategorizationNetsweeper’s dynamic categorization engine scans and sorts the content of billions of websites and adds this information to a da ...

Category Guards Web
NetSweeper
Tenable Network Security

The Nessus vulnerability scanner is the world leading vulnerability scanner, with over five million downloads to-date. Nessus is currently rated among the top vulnerability scanners throughout the security industry and is endorsed by professional security ...

Category Network Scanners

NeXpose is an enterprise-level vulnerability assessment and risk management product that identifies security weaknesses in a network computing environment. It offers a comprehensive, one-stop solution for data gathering, reporting and remediation, elimina ...

Category Network Scanners
NeXpose
VSS monitoring, Inc.

VSS monitoring's Taps cover both copper and fiber media from T1 to 10Gig. The Taps include the 1X1 series (1 network X 1 monitoring device), 1XN series and also the NX1 series (Tap Switches). The aggregation taps have up to 64MB of memory to buffer traffi ...

Category Network Taps
NextGig Systems

Fast and reliable, our passive network taps provide access for security and network management devices on all types of networks. - 100% visibility to link traffic for your security and network monitoring tools - In-line link failover protection - Access r ...

Category Network Taps
Net Optics Taps
Halon Secuirty

Halon is an email software distribution. It provides a full stack, scriptable approach to functions such as delivery (SMTP/LMTP), routing, security (anti-spam, signing), automation and integration; everything you need in front of your email storage. You ...

The Halon MTA
Data Guard Systems Inc

AlertBoot offers a cloud-based full disk encryption, file encryption and mobile device security service for companies of any size who want a scalable and easy-to-deploy solution. Centrally managed through a web based console, AlertBoot offers mobile devic ...

AlertBoot

Learn to turn malware inside out! This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills t ...

Category Virus Training

3 day practical computer forensics training course - Learn about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation. Using practical case scenarios, you will be guided through the process ...

CFIP Certified Forensic Investigation Practitioner

2-day practical penetration testing course - Build on the knowledge gained in CSTA Ethical Hacking: Hands-On, using the frameworks & tools used by professional penetration testers to: audit & compromise system security, assess weaknesses in w ...

Category Ethical Hacking
New Net Technologies

NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most compre ...

Offensive Security

Penetration Testing with Kali (PWK) is a self-paced online pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique pen ...

Category Ethical Hacking
Penetration Testing with Kali Linux

This certification option is centered on Snort, the industry leading open source intrusion prevention solution. Candidates are assessed on a wide range of criteria that encompasses all the necessary open source components and technical skills for successf ...

Snort Certified Professional (SnortCP)
INVEA-TECH a.s.

The FlowMon solution delivers the flow-based (NetFlow/IPFIX) monitoring for all organizations and all networks from 10 Mbps to 10 Gbps. It provides the statistics necessary for network monitoring, security, troubleshooting, IP accounting and billing, capa ...

FlowMon
Nexor Limited

The Nexor Data Diode is an EAL7+* evaluated solution to the information sharing problem by only allowing data transfers in one direction, guaranteeing that no data will leak back from the secure to the less secure network.

Category Data Diodes
Nexor Data Diode