Michele M Jordan
This certification option is centered on Snort, the industry leading open source intrusion prevention solution. Candidates are assessed on a wide range of criteria that encompasses all the necessary open source components and technical skills for successf ...
Penetration Testing with Kali (PWK) is a self-paced online pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique pen ...
OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...
NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most compre ...
Internet Security Pro combines the power of COMODO's award-winning Firewall and AntiVirus software to protect your PC from malicious software and Hackers. Removes existing viruses instantly Blocks all unwanted Internet attacks ...
Next generation of pytbull, IDS/IPS testing framework
Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use differ ...
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
Learn to turn malware inside out! This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills t ...
SecureTrack empowers large corporations to automate and streamline Firewall management activities. With Tufin SecureTrack, you can effectively audit your Firewall, monitor policy changes in real-time and test changes for compliance with corporate policies ...
MailXaminer is a comprehensive email examination tool to carry out a thorough analysis of a bunch of emails and its header. With the help of this tool; forensicators can preview more than 20 email file types and perform advanced search operation within th ...
WEPCrack is an open source tool for breaking 802.11 WEP secret keys
Kismet is a 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, including Prism2 based cards supported by the Wlan-NG project (Linksys, Dlink, Rangelan, etc), cards which support standard packet c ...
Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts ...
Manage all of your vulnerability data from 3rd party scanners with one console. proVM Auditor ingests data from vulnerability assessment scanners and allows you to perform centralized analysis of all of your findings. The SQL database supports features su ...
Trust your inbox again with cloud email security protecting your people and critical information from malware, as well as malware free phishing and impersonation attempts. Keep Imposters OutAutomatically identify your high-profile targets for malware-fre ...
Capsa Popular
Capsa is a portable network analyzer application for both LANs and WLANs which performs real-time packet capturing capability, 24x7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis. Capsa's comprehen ...
ArcSight ESM is a comprehensive enterprise security platform. By centrally collecting and analyzing security data from heterogeneous devices, ArcSight helps customers worldwide to manage information risk and protect critical assets.Security organizations ...
Cisco Adaptive Security Appliance (ASA) Software is the core operating system that powers the Cisco ASA family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual. AS ...
Welcome to the largest underground hacking event in the world. DefCon hosts lots of small, regional meetings, and a DefCon event that coincides with the Black Hat Briefings in Las Vegas.