Michele M Jordan

Security University
Commercial
Pricing Model

Earn your CWNA™ certification and master the fundamentals of wireless and how to secure your wireless infrastructures. This class provides the networking professional a complete foundation of knowledge for entering into or advancing in the ...

ModifiedNever
Security University
Commercial
Pricing Model

This Intense 72 hour Q/EH® Qualified/ Ethical Hacker class provides you with basic understanding of the hacking skills and tools required to determine potential security weakness in your organization. This class is your next class after Security+ and befo ...

Category Ethical Hacking
Modified
Qualified Ethical Hacker and Q/EH Exam
Security University
Commercial
Pricing Model

Earn your CWSP™ certification and master the fundamentals of wireless and how to secure your wireless infrastructures. This course targets experienced networking professionals who wish to gain critical skills in wireless networking security, incl ...

ModifiedNever
Commercial
Pricing Model

VPN-Q 2010 is a multi-layer remote access gateway solution which implements real-world security principles by layering strong authentication, health state checking, quarantine control, network access controls and protocol filtering in a single solution. C ...

Category VPN Clients
Modified
VPN-Q 2010
Commercial
Pricing Model

Winfrasoft IAG Appliance solution running IAG 2007 (Microsoft Forefront Edge Security and Access) provides mobile and remote workers an easy to use method of accessing corporate resources from any location, using a variety of end-point devices such kiosks ...

Category VPN Servers
Modified
Limited Free Trial
Pricing Model

GamaSec scanner explores the entire Web application environment and registers its structure and contents. Then it mimics actual hacking methods to identify and uncover the details of any point that is vulnerable to an attack including: SQL Injection Atta ...

Modified
GamaScan
Security-Database
Freeware
Pricing Model

Security-Database provides free service focused on vulnerability and tools watch. The vulnerability database relies on open standards as CVE, CVSS, CWE, CPE and OVAL. The ToolsWatch process supplies the security community with the latest auditing and pene ...

Modified
Security-Database Watch
Filesig Software Solutions
Commercial
Pricing Model

Simple Carver Suite is a collection of unique tools designed for a number of purposes including but not limited to forensic computing, data recovery and eDiscovery. Simple Carver originally began as a single data recovery tool, a basic file carver which h ...

Category Forensic Tools
Modified
Simple Carver Suite
Commercial
Pricing Model

DirX Identity offers an extensive identity management solution for enterprises and organizations. It gives the right people the right access to the right resources at the right time and thus leads to productivity, information security, a perceptible reduc ...

Modified
NMI (NSF Middleware Initiative)
Open Source
Pricing Model

The primary goal of the NMI-EDIT Consortium, part of the NSF Middleware Initiative (NMI), is to improve the productivity of the research and education community through development, testing, and dissemination of architectures, software, and practices ...

Modified
nmi-edit
Commercial
Pricing Model

Add deep context, intelligence and security to decisions about which users should have access to your organization’s data and applications, on-premises or in the cloud. Modernized, modular IBM Security Verify solution provides deep, AI-powered context fo ...

Modified
IBM Security Verify
Freeware
Pricing Model

Oracle Directory Server Enterprise Edition (formerly SUN Directory Server Enterprise Edition) is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it ...

Modified
Commercial
Pricing Model

Oracle Identity Analytics provides enterprises with the ability to define and manage roles and automate critical identity-based controls. Once roles are defined, certified, and assigned, the software continues to deliver scalable and sustainable identity ...

Modified
Oracle Identity Analytics
Core Security
Commercial
Pricing Model

Access Assurance Suite is an intelligent identity and access management (IAM) software solution that enables organizations to deliver informed provisioning, meet ongoing regulatory compliance, and leverage actionable analytics for improved identity govern ...

Modified
Access Assurance Suite
CyberArk Software
Commercial
Pricing Model

Protect, monitor and control privileged access, with on-site deployment. Deploy in your datacenter, private or public cloud, to meet regulatory compliance or organizational needs Confidently migrate to SaaS with the backing of CyberArk’s proven expertis ...

Modified
Privileged Access Manager
Open Source
Pricing Model

A regularly-updated signature-based scanner that can detect file inclusion, sql injection, command execution, XSS, DOS, directory traversal vulnerabilities of a target Joomla! web site. Overview Joomla! is probably the most widely-used CMS out there ...

Category Website Scanners
Modified
Freeware
Pricing Model

A Java Hijacking tool for web application session security assessment. A simple Java Fuzzer that can mainly be used for numeric session hijacking and parameter enumeration.

Category Website Scanners
Modified
Security University
Commercial
Pricing Model

Finally, a  Forensics class that teaches hands-on Tactical Forensics skills with validating  practical labs. This class is for students who want a comprehensive understanding of Forensic Examination and not just concepts of investigations. ...

Modified
Tangent, Inc.
Commercial
Pricing Model

WebHawk, next generation content filtering for one third the cost. Content Filtering WebHawk filters automatically block inappropriate websites based on the categorizations you define. Webhawk also monitors and logs all user web activity. In addition ...

Category Uncategorised
Modified
Commercial
Pricing Model

DirX Audit provides a platform for the central collection, normalization, storage, and analysis of audit trails from different audit sources. Auditors can use DirX Audit's web-based user interface to analyze and correlate the audit logs in the central ...

Modified