Who We Are :-
Information Security Strategic Solutions, the training company and an able certification body, has been formed to bridge the huge gap in the information security training and consulting field. The Information Security trainings are organized and delivered by people who has rich industry experience and are very well known in Information Security circle.
The company is formed by Subramaniam Sankaran, who has a rich industry experience in Information Security field and a very well known professional. He had delivered more than 150 CISSP sessions, CEH, ECSA, LPT, OSCP, ISO27001 LA and Cloud Security trainings, across the world.
A very well known consultant and had been associated with many governments across the world as Information Security Consultant. He is a trainer for United Nations Support Base, Valencia.
Enter your Details Here
Courses Offered :
This course is the most comprehensive review of information security concepts and industry best practices, and focuses on the eight domains of the CISSP CBK (Common Body of Knowledge) that are covered in the CISSP exam. Read More
The Certified CISO (CCISO) EC-Council program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view Read More
ISSS offers this top-notch CSSLP Boot Camp to train and prepare individuals for the Certified Secure Software Lifecycle Professional (CSSLP) certification exam, the premier security certification created and administered by the International Systems Security Certification Consortium Read More
Cloud Computing is the future of IT, a number of studies have pointed to the requirement of addressing the IT industry’s skills gap and training professionals in both security and cloud computing. This CCSK course from ISSS helps upgrade professional’s skillsets. Read More
ISO 27001 is an Information Security Management System. It is a suite of processes necessary to manage the information security within an organisation. Organisations implementing ISMS must establish appropriate security policies, identify risks and carry risk assessments Read More
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system Read More
ECSA is a globally respected penetration testing program that covers the testing of modern infrastructures, operating systems, and application environments while teaching the students how to document and prepare professional penetration testing report. Read More