Michele M Jordan
Wide-spectrum: SpamAssassin uses a wide variety of local and network tests to identify spam signatures. This makes it harder for spammers to identify one aspect which they can craft their messages to work around. Free software: it is distributed ...
With an intuitive, yet flexible GUI, and unmatched performance, EnCase Version 4 provides investigators with the tools to conduct large-scale and complex investigation with accuracy and efficiency. Our award winning solution yields completely non-invasive ...
Remote Access Client is available for Windows and MacOS. VPN Client VPN Auto-Connect Multi-Factor Authentication Support Secure Hotspot Registration Compliance Scanning Central Management There is also the Capsule Connect product for Android and iOS, a ...
Have you ever considered what makes an anti-malware application effective? We at Malwarebytes have created an easy-to-use, simple, and effective anti-malware application. Whether you know it or not your computer is always at risk of becoming infected with ...
OpenText EnCase Forensic is a court-proven solution for finding, decrypting, collecting and preserving forensic data from a wide variety of devices, while ensuring evidence integrity and seamlessly integrating investigation workflows. Thorough evidence c ...
An automated and centralized identity management platform is the only viable means for delivering consistent service and maintaining control over application security. As the only Identity Lifecycle Management solution built on a platform that incorporate ...
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the curren ...
DefensePro’s behavior-based, self-learning mechanism proactively scans for anomalous network, server and client traffic patterns. When detecting an attack, DefensePro characterizes the attack’s unique behavior, establishes a real-time signature and create ...
Check Point endpoint security includes data security, network security, advanced threat prevention, forensics, endpoint detection and response (EDR), and remote access VPN solutions. To offer simple and flexible security administration, Check Point’s enti ...
The Certified Information Systems Security Professional (CISSP) is a very difficult certification to achieve and is considered a global standard that proves an individual?s proficiency in several different security disciplines. It attests to that person?s ...
Security in the industry for mobile operators, internet service providers, and hosting providers Cloudmark Authority utilizes a unique combination of proprietary technologies including Advanced Message Fingerprinting algorithms and real-time threat ...
4 years Full Time / 5 years Sandwich Course
3 years Full Time / 4 years Sandwich Course
3 years Full Time / 4 years Sandwich Course
4 years Full Time
3 years Full Time / 4 years Sandwich Course
4 years Sandwich Course
3 years Full Time / 4 years Sandwich Course
w3af is a Web Application Attack and Audit Framework. The project's goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. The framework is extended using plugins. For now, think about nessus p ...
3 years Full Time
Page 4 of 56