SC

Omnitron Launches Enterprise And Industrial PoE Fiber Switches

Omnitron Systems introduced its managed and unmanaged RuggedNet™ industrial PoE fiber switches and OmniConverter™ enterprise PoE fiber switches that enable fiber optic distance extension to PoE and PoE+ powered devices. Both the RuggedNet and OmniConverter PoE fiber switches feature four or eight 10/100/1000 RJ-45 ports capable of delivering 15.4W PoE or 30W PoE+ to all ports, and one or two fiber Gigabit ports.

PAXTON BLU TRAINING

This session is essential for anyone installing Paxton BLU. The course will cover everything you need to know to install and configure the Paxton BLU system.

NET2 ESSENTIAL TRAINING

This BICSI CEC registered session will cover everything you need to know to install and configure the Net2 hardware, and the day to day use of the system.

NET2 ADVANCED TRAINING

The Net2 Advanced workshop is designed for installers who have already completed the Net2 Essential training. Discover how much more Net2 can offer your customers

Techno Security & Digital Forensics Conference 2017

The Nineteenth Annual Techno Security & Digital Forensics Conference will be held June 4 – 7, 2017 in sunny Myrtle Beach at the Marriott at Grande Dunes Resort. This conference, previously known as the Techno Security & Forensics Investigations Conference held in conjunction with Mobile Forensics World, welcomes corporate network security professionals, federal, state and […]

Hacker Tools, Techniques, Exploits and Incident Handling

The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn’t!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly […]

Intrusion Detection In-Depth

SEC503: Intrusion Detection In-Depth delivers the technical knowledge, insight, and hands-on training you need to defend your network with confidence. You will learn about the underlying theory of TCP/IP and the most used application protocols, such as HTTP, so that you can intelligently examine network traffic for signs of an intrusion. You will get plenty […]