Skip to main content

Michele M Jordan

University of Glamorgan, Cardiff and Pontypridd

2 years Full Time

Sheffield Hallam University

4 years Full Time / 5 years Sandwich Course

Sheffield Hallam University

4 years Sandwich Course

OverviewIntercept X for Mobile protects your Android device without compromising performance or battery life. Real-time synchronization with SophosLabs ensures that your mobile device is always protected from the latest malware and online threats – just l ...

Category Mobile Devices
Intercept X for Mobile for Android
London Metropolitan University

3 years Full Time

Andrés Riancho

w3af is a Web Application Attack and Audit Framework. The project's goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. The framework is extended using plugins. For now, think about nessus p ...

Category Website Scanners
w3af
Spiceworks, Inc.

Spiceworks! The free “everything IT” network management software. Inventory Your Network Monitor Your Network Run an IT Help Desk Manage Configuration Changes Map Your Network With Spiceworks you can: * Create a network map of your IT network * See networ ...

Category Network Mapping
Spiceworks

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and funct ...

Category Website Scanners
Hitachi ID Systems, Inc.

Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is r ...

Bravura Identity
Hitachi ID Systems, Inc.

Hitachi ID Bravura Privilege secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating st ...

Hitachi ID Bravura Privilege
Hitachi ID Systems, Inc.

Hitachi ID Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that ...

Hitachi ID Bravura Identity
Hitachi ID Systems, Inc.

Hitachi ID Bravura Pass is an integrated solution for managing credentials across systems and applications. It simplifies the management of passwords, tokens, smart cards, security questions and biometrics. Bravura Pass lowers IT support cost and imp ...

Hitachi ID Bravura Pass

SCNR is a modular, distributed, high-performance DAST web application security scanner framework, capable of analyzing the behavior and security of modern web applications and web APIs. It is inspired and built by the more than a decade of experience gat ...

Category Website Scanners
SCNR
Brian Carrier

Autopsy is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It is used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recov ...

Category Forensic Tools
Autopsy

This training course is a series of educational interactive training sessions where the attendees will gain hands-on experience. They will be able to identify security flaws in web applications customised or built for the training course. They will also b ...

This training course offers a collection of live demonstrations featuring a variety of hacking and defensive techniques used by hackers. Tranchulas online labs are available 24×7 for practising the techniques and tools demonstrated by our instructor durin ...

Category Ethical Hacking
Hands-On Penetration Testing and Ethical Hacking Training
Palo Alto Networks

The Palo Alto Networks Next-Generation Security Platform has four key characteristics that enable the prevention of successful cyberattacks: Natively integrated technologies that leverage a single-pass architecture to exert positive control based on ap ...

Palo Alto Networks Next Generation Firewalls

Oracle identity and access management solutions secure access to enterprise applications for both cloud and on-premises deployments. Flexible protection for your workloads Oracle Identity and Access Management solutions provide deployment options to pro ...

Oracle Identity and Access Management

Oracle Identity Federation (OIF) is a complete, enterprise-level solution for secure identity information exchange between partners. OIF reduces account management for partner identities and lowers the cost of integrations through support of industry fede ...

Oracle Identity Federation
Oracle

Oracle Access Manager allows users of your applications or IT systems to log in once and gain access to a broad range of IT resources. Oracle Access Manager provides an identity management and access control system that is shared by all your applications. ...