Michele M Jordan

PTR Associates Ltd

You will learn what the components of Microsoft SQL Server 7 are and understand what the system administrators should be doing. Find out how to get information out of SQL Server and how to interpret it. Experiment with a live SQL Server 7 network in a lab ...

Modified
PTR Associates Ltd

This hands-on course is intended for auditors and security specialists who are aware their businesses use Oracle based products, but do not understand the database platform and therefore the risks it may carry. You will learn how Oracle is built and a con ...

Modified
Learning Tree International
Commercial
Pricing Model

You Will Learn How To * Implement and test secure Web applications in your organisation * Identify, diagnose and correct the most serious Web application vulnerabilities * Configure a Web server to encrypt Web traffic with HTTPS * Prot ...

Modified
Next Generation Security Software Ltd
Commercial
Pricing Model

This is a cutting-edge, hands-on course aimed at hackers who want to exploit web applications, and developers who want to know how to defend them. The course is presented by the authors of the critically-acclaimed Web Application Hacker's Handbook, and ...

Modified
The University of Central Florida

The Wireless Access Network Training Program is a 16 hour class that is designed for Law Enforcement Investigators, auditors, and Corporate Investigators to promote awareness of illegal wireless computer activities. During the class students will learn ho ...

ModifiedNever
cwnp (Certified Wireless Network Professional)
Commercial
Pricing Model

The Wireless LAN Security course consists of hands on learning using the latest enterprise wireless LAN security and auditing equipment. This course addresses in detail the most up-to-date WLAN intrusion and DoS tools and techniques, functionality of the ...

Modified
Systems & Network Training Ltd

A hands on training course concentrating solely on wireless LAN security. The course progresses from attacking a basic WLAN onto implementing evermore stronger security features in order to secure the WLAN.

ModifiedNever
Network Intelligence (I) Pvt. Ltd.

At the end of the day, the large majority of security vulnerabilities are primarily related to poorly software design and coding. This course goes to heart of the problem and educates developers about secure application design, development, and testing. I ...

ModifiedNever
Foundstone, Inc.
Commercial
Pricing Model

What Will You Learn? For the advanced security engineer, this course is the pinnacle of the Ultimate Hacking series and is a continuation of the Ultimate Hacking: Hands On course. It encompasses such topics as wireless security, SQL injection techniques, ...

Category Ethical Hacking
Modified
Commercial
Pricing Model

What Will You Learn? Understand the key security features of the C++ language, the common security pitfalls developers make and how to build secure and reliable enterprise applications using C++. Students are lead through hands on code examples that highl ...

Modified
Guru Labs LC
Commercial
Pricing Model

Course Description: This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Enterprise Linux Security Administration course. After a detailed discussion of the TCP/IP suite component protocols and eth ...

Category Network Security
Modified

EtherDetect Popular

Commercial
Pricing Model

This protocol analyser will Organize captured packets in a connection-oriented view. Capture IP packets on your LAN with nearly no packets losing. Its real-time analyzer enables on-the-fly content viewing while capturing and analyzing, parse and decode an ...

Modified
EtherDetect

CommView Popular

TamoSoft, Inc.
Commercial
Pricing Model

CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many use ...

Modified
CommView

PacketMon Popular

Commercial
Pricing Model

AnalogX PacketMon allows you to capture IP packets that pass through your network interface - whether they originated from the machine on which PacketMon is installed, or a completely different machine on your network! Once the packet is received, you can ...

Modified
PacketMon
Manage Engine
Commercial
Pricing Model

NetFlow Analyzer, a complete traffic analytics tool, that leverages flow technologies to provide real time visibility into the network bandwidth performance. NetFlow Analyzer is a unified solution that collects, analyzes and reports about what your networ ...

Modified
NetFlow Analyzer
Commercial
Pricing Model

Cisco IOS NetFlow efficiently provides a key set of services for IP applications, including network traffic accounting, usage-based network billing, network planning, security, Denial of Service monitoring capabilities, and network monitoring. NetFlow pro ...

Modified
Commercial
Pricing Model

The StealthWatch sensor appliance provides fast, accurate monitoring for unexpected or unauthorized network behavior. Using flow-based architecture it provides continuous, real-time network traffic monitoring and instant identification of attack

ModifiedNever
Commercial
Pricing Model

Traffic Sentinel makes use of embedded instrumentation within switches, routers, load balancers, and servers. Industry standard sFlow provides the richest information, greatest scalability, and is supported by the largest number of vendors (see sFlow Capa ...

Modified
Traffic Sentinel
Infoblox Inc.
Commercial
Pricing Model

NetMRI is a network management product focused on network change and configuration management (NCCM). It enables you to automate network change, see the impact of changes on network health, manage network configurations and meet a variety of compliance re ...

Modified
Flowerfire Inc.
Commercial
Pricing Model

Sawmill is universal log analysis software that runs on every major platform. It can process almost any type of log data. The reports that Sawmill generates are hierarchical, attractive, and heavily cross-linked for easy navigation. Complete documentation ...

Modified