Michele M Jordan

Welcome to the largest underground hacking event in the world. DefCon hosts lots of small, regional meetings, and a DefCon event that coincides with the Black Hat Briefings in Las Vegas.

ModifiedNever

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

ModifiedNever
University of Glamorgan

This specialist course focuses on the technical aspects of computer system security and systems management. The award is designed to provide up-to-date, relevant and practical information on the technical aspects of computer security. This field is becomi ...

ModifiedNever

Capsa Popular

Limited Free Trial
Pricing Model

Capsa is a portable network analyzer application for both LANs and WLANs which performs real-time packet capturing capability, 24x7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis. Capsa's comprehen ...

Modified
Open Source
Pricing Model

Formerly Ethereal. Wireshark is the world's foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries, Features Include: Deep inspection of hundreds of protocols, with more being added all the time L ...

Modified
NetSweeper, Inc.
Commercial
Pricing Model

A complete solution deployed in the cloud or on-premise, with carrier-grade performance and reliability Dynamic CategorizationNetsweeper’s dynamic categorization engine scans and sorts the content of billions of websites and adds this information to a da ...

Category Guards Web
Modified
NetSweeper
Tenable Network Security

The Nessus vulnerability scanner is the world leading vulnerability scanner, with over five million downloads to-date. Nessus is currently rated among the top vulnerability scanners throughout the security industry and is endorsed by professional security ...

Category Network Scanners
Modified
Commercial
Pricing Model

NeXpose is an enterprise-level vulnerability assessment and risk management product that identifies security weaknesses in a network computing environment. It offers a comprehensive, one-stop solution for data gathering, reporting and remediation, elimina ...

Category Network Scanners
Modified
NeXpose
VSS monitoring, Inc.
Commercial
Pricing Model

VSS monitoring's Taps cover both copper and fiber media from T1 to 10Gig. The Taps include the 1X1 series (1 network X 1 monitoring device), 1XN series and also the NX1 series (Tap Switches). The aggregation taps have up to 64MB of memory to buffer traffi ...

Category Network Taps
Modified
NextGig Systems
Commercial
Pricing Model

Fast and reliable, our passive network taps provide access for security and network management devices on all types of networks. - 100% visibility to link traffic for your security and network monitoring tools - In-line link failover protection - Access r ...

Category Network Taps
Modified
Net Optics Taps
Halon Secuirty
Commercial
Pricing Model

Halon is an email software distribution. It provides a full stack, scriptable approach to functions such as delivery (SMTP/LMTP), routing, security (anti-spam, signing), automation and integration; everything you need in front of your email storage. You ...

Modified
The Halon MTA
Data Guard Systems Inc
Commercial
Pricing Model

AlertBoot offers a cloud-based full disk encryption, file encryption and mobile device security service for companies of any size who want a scalable and easy-to-deploy solution. Centrally managed through a web based console, AlertBoot offers mobile devic ...

Modified
AlertBoot
Commercial
Pricing Model

Learn to turn malware inside out! This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills t ...

Category Virus Training
Modified
Commercial
Pricing Model

3 day practical computer forensics training course - Learn about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation. Using practical case scenarios, you will be guided through the process ...

Modified
CFIP Certified Forensic Investigation Practitioner
Commercial
Pricing Model

2-day practical penetration testing course - Build on the knowledge gained in CSTA Ethical Hacking: Hands-On, using the frameworks & tools used by professional penetration testers to: audit & compromise system security, assess weaknesses in w ...

Category Ethical Hacking
Modified
New Net Technologies

NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most compre ...

Modified
Offensive Security
Commercial
Pricing Model

Penetration Testing with Kali (PWK) is a self-paced online pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique pen ...

Category Ethical Hacking
Modified
Penetration Testing with Kali Linux
Commercial
Pricing Model

This certification option is centered on Snort, the industry leading open source intrusion prevention solution. Candidates are assessed on a wide range of criteria that encompasses all the necessary open source components and technical skills for successf ...

Modified
Snort Certified Professional (SnortCP)
INVEA-TECH a.s.
Commercial
Pricing Model

The FlowMon solution delivers the flow-based (NetFlow/IPFIX) monitoring for all organizations and all networks from 10 Mbps to 10 Gbps. It provides the statistics necessary for network monitoring, security, troubleshooting, IP accounting and billing, capa ...

Modified
FlowMon
Nexor Limited
Commercial
Pricing Model

The Nexor Data Diode is an EAL7+* evaluated solution to the information sharing problem by only allowing data transfers in one direction, guaranteeing that no data will leak back from the secure to the less secure network.

Category Data Diodes
Modified
Nexor Data Diode