A powerful rack-mountable plug-and-play appliance, Network Security Manager offers comprehensive, real-time, policy-based management of your McAfee IPS sensors. Flexible and scalable, this hardened appliance can manage up to 100 Network Security Manager I ...
This forensics training course (3 days) gives delegates a practical understanding of Data structures and potential evidence as produced in Apple Mac OS X environments and Implementing forensic tools on Mac OS X-based file systems. Highlights of this t ...
2 day wireless security training course followed by CSWA certification exam (optional). The course follows the evolution of wireless security, teaching the underlying principles so that delegates leave not only with an understanding of the ...
3 day hands-on journey into the hacking mindset, including the CSTA certification exam. Practically apply the tools and techniques that penetration testers use. The course is ideal for network administrators, security officers & crime prevention ...
2-day practical penetration testing course - Build on the knowledge gained in CSTA Ethical Hacking: Hands-On, using the frameworks & tools used by professional penetration testers to: audit & compromise system security, assess weaknesses in w ...
I've put together a single floppy or CD which contains things needed to edit the passwords on most systems. The bootdisk supports standard (dual)IDE controllers, and most SCSI-controllers with the drivers supplied in a separate archive. It does not need ...
4 day highly practical course designed to equip information security specialists with the knowledge and skills to deal effectively with incident response situations. It also gives investigators valuable insight into forensic acquisition under di ...
Lancope's StealthWatch System is aimed at both network and security administrators – with an integrated platform that leverages network intelligence for both parties. Leveraging NetFlow, sFlow and packet capture, StealthWatch unifies and optimizes behavio ...
Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks ...
ArcSight ESM is a comprehensive enterprise security platform. By centrally collecting and analyzing security data from heterogeneous devices, ArcSight helps customers worldwide to manage information risk and protect critical assets.Security organizations ...
Core Impact is designed to enable security teams to conduct advanced penetration tests with ease. With guided automation and certified exploits, the powerful penetration testing software enables you to safely test your environment using the same technique ...
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perf ...
Kismet is a 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, including Prism2 based cards supported by the Wlan-NG project (Linksys, Dlink, Rangelan, etc), cards which support standard packet c ...
WEPCrack is an open source tool for breaking 802.11 WEP secret keys
Internet Security Pro combines the power of COMODO's award-winning Firewall and AntiVirus software to protect your PC from malicious software and Hackers. Removes existing viruses instantly Blocks all unwanted Internet attacks ...
iptables is a generic table structure for the definition of rulesets. Each rule within an IP table consists of a number of classifiers (iptables matches) and one connected action (iptables target).
Cisco Adaptive Security Appliance (ASA) Software is the core operating system that powers the Cisco ASA family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual. AS ...
Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts ...
SecureTrack empowers large corporations to automate and streamline Firewall management activities. With Tufin SecureTrack, you can effectively audit your Firewall, monitor policy changes in real-time and test changes for compliance with corporate policies ...
NIKSUN's award-winning NetDetector is a full-featured appliance for network security surveillance, signature-based anomaly detection, analytics and forensics. It complements existing network security tools, such as firewalls, intrusion detection/preventio ...
© Computer Network Defence Limited 2022