Skip to main content

Michele M Jordan

PTR Associates Ltd

You will learn what the components of Microsoft SQL Server 7 are and understand what the system administrators should be doing. Find out how to get information out of SQL Server and how to interpret it. Experiment with a live SQL Server 7 network in a lab ...

PTR Associates Ltd

This hands-on course is intended for auditors and security specialists who are aware their businesses use Oracle based products, but do not understand the database platform and therefore the risks it may carry. You will learn how Oracle is built and a con ...

Learning Tree International

You Will Learn How To * Implement and test secure Web applications in your organisation * Identify, diagnose and correct the most serious Web application vulnerabilities * Configure a Web server to encrypt Web traffic with HTTPS * Prot ...

Next Generation Security Software Ltd

This is a cutting-edge, hands-on course aimed at hackers who want to exploit web applications, and developers who want to know how to defend them. The course is presented by the authors of the critically-acclaimed Web Application Hacker's Handbook, and ...

The University of Central Florida

The Wireless Access Network Training Program is a 16 hour class that is designed for Law Enforcement Investigators, auditors, and Corporate Investigators to promote awareness of illegal wireless computer activities. During the class students will learn ho ...

cwnp (Certified Wireless Network Professional)

The Wireless LAN Security course consists of hands on learning using the latest enterprise wireless LAN security and auditing equipment. This course addresses in detail the most up-to-date WLAN intrusion and DoS tools and techniques, functionality of the ...

Systems & Network Training Ltd

A hands on training course concentrating solely on wireless LAN security. The course progresses from attacking a basic WLAN onto implementing evermore stronger security features in order to secure the WLAN.

Network Intelligence (I) Pvt. Ltd.

At the end of the day, the large majority of security vulnerabilities are primarily related to poorly software design and coding. This course goes to heart of the problem and educates developers about secure application design, development, and testing. I ...

Foundstone, Inc.

What Will You Learn? For the advanced security engineer, this course is the pinnacle of the Ultimate Hacking series and is a continuation of the Ultimate Hacking: Hands On course. It encompasses such topics as wireless security, SQL injection techniques, ...

Category Ethical Hacking

What Will You Learn? Understand the key security features of the C++ language, the common security pitfalls developers make and how to build secure and reliable enterprise applications using C++. Students are lead through hands on code examples that highl ...

Guru Labs LC

Course Description: This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Enterprise Linux Security Administration course. After a detailed discussion of the TCP/IP suite component protocols and eth ...

Category Network Security

EtherDetect Popular

This protocol analyser will Organize captured packets in a connection-oriented view. Capture IP packets on your LAN with nearly no packets losing. Its real-time analyzer enables on-the-fly content viewing while capturing and analyzing, parse and decode an ...

EtherDetect

CommView Popular

TamoSoft, Inc.

CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many use ...

CommView

PacketMon Popular

AnalogX PacketMon allows you to capture IP packets that pass through your network interface - whether they originated from the machine on which PacketMon is installed, or a completely different machine on your network! Once the packet is received, you can ...

PacketMon
Manage Engine

NetFlow Analyzer, a complete traffic analytics tool, that leverages flow technologies to provide real time visibility into the network bandwidth performance. NetFlow Analyzer is a unified solution that collects, analyzes and reports about what your networ ...

NetFlow Analyzer

Cisco IOS NetFlow efficiently provides a key set of services for IP applications, including network traffic accounting, usage-based network billing, network planning, security, Denial of Service monitoring capabilities, and network monitoring. NetFlow pro ...

The StealthWatch sensor appliance provides fast, accurate monitoring for unexpected or unauthorized network behavior. Using flow-based architecture it provides continuous, real-time network traffic monitoring and instant identification of attack

Traffic Sentinel makes use of embedded instrumentation within switches, routers, load balancers, and servers. Industry standard sFlow provides the richest information, greatest scalability, and is supported by the largest number of vendors (see sFlow Capa ...

Traffic Sentinel
Infoblox Inc.

NetMRI is a network management product focused on network change and configuration management (NCCM). It enables you to automate network change, see the impact of changes on network health, manage network configurations and meet a variety of compliance re ...

Flowerfire Inc.

Sawmill is universal log analysis software that runs on every major platform. It can process almost any type of log data. The reports that Sawmill generates are hierarchical, attractive, and heavily cross-linked for easy navigation. Complete documentation ...