X
X
ICSS-LOGO
Toll-Free - 1800-123-500014    Call Us at: +91 8972107846 / 6291980077
  • Home
  • Security Products
    • S.A.V.E
    • Marg Darshak
  • Services
    • Compliance Services
      • GDPR Service
      • PCI DSS Compliance Service
      • Hipaa Compliance Service
      • ISO 27001 Lead Auditor Service
    • VAPT Services
      • Network Penetration Testing - NPT
      • Web Penetration Testing - WAPT
      • Mobile App Penetration Testing
      • Security Operations Center - SOC
      • Data Recovery
      • Source code review
      • VAPT Services
      • Cloud Security Service
      • Red Teaming as a Service
      • Social Engineering as a Service
      • Email Spear Phishing
      • Vishing (Voice Call) Testing
      • Work from Home Service
      • Automated Threat Modeling
  • Training Programs
    • Diploma Courses
      • Diploma in Machine Learning - D|ML & AI
      • Diploma in Cyber Security
      • Diploma in Advance Cyber Security
      • Diploma in Network Security - D | NS
      • Diploma in web application security - D | WAS
      • Diploma In Advanced Cloud & Network Security In Kolkata
      • Diploma in Cloud Infrastructure Management
    • Cyber Security courses
      • C | EH v11 - Certified Ethical Hacker Training
      • Ethical Hacking - C | EHP
      • E | CSA | EC - Council Certified Security Analyst
      • C | SWD - Certified Secure Web Developer
      • Iot Penetration Testing Training
      • Network Penetration Testing - C | NPT
      • Web Application Penetration Testing - c | WAPT
      • Reverse Engineering and Malware Analysis Co
      • Android Penetration Testing - C | APT
      • Computer Forensic - C | HFI
    • Networking Courses
      • CCNA | Cisco Certified Network Associate
      • CCNP Certification
    • Programming Course
      • Python Programming Course - C | PP
      • Python Programming (Advance) - C | APP
      • Certified Django Developer - C | DD
      • JAVA Training (Basic + Advance)
      • Machine Learning Using R Language
      • Andorid Development Training - C | AD
    • Cloud Computing Courses (AWS | Microsoft Azure)
      • Amazon Web Services Training - C | AWSD
      • Amazon Web Services (Advance) Training - C | AAWSD
      • Microsoft Azure Training - C | AP
      • DevOps Certification
    • Machine Learning Training
      • Machine Learning Using Python
    • Embedded System & Robotics - C | ESRP
    • Internet of Things Training - C | IOTP
    • ISO/IEC 27001 | Lead Auditor Training
    • Job Placement Notice
    • Winter Training
    • Student Feedback
    • Verify Your Certificate
  • Clients
  • Company
    • Company Details
    • Campus Representative
    • Workshop
    • Tutorials
    • Bug Bounty Program
    • Franchisee
    • Career
    • Green Fellow IT Security Solutions
  • Research & Article
    • Research Finding of ICSS Students
      • Python
        • Project Report on Tic-Tac-Toe Game by Muttashim Sarkar (ICSS Student)
        • Project Report on Face Recognition by Priyam Harsh (ICSS Student)
        • Simple Calculator using Python | ICSS Student | Anik Banerjee & Subhojit Roy
        • defacer | Python script | Indrajit Karmakar
      • Ethical Hacking
        • Brute Force Attack on Wireless Network | ICSS Student | Debshubra Chakraborty
        • Vulnerability Assessment & Penetration Testing Report on Windows XP 2003 | ICSS Student – Shivanshi Sinha
        • Web Application Vulnerability Scanners and Their Application
      • Networking
        • RIP (ROUTING INFORMATION PROTOCOL) Article by ICSS Student – Aishwarya Jena
        • TP-Link TL-WR840N v5 | CVE-2019-12195
        • OSPF with DHCP configuration | ICSS Student | Swastick Raj Chatterjee
      • AWS
        • Project Report on Hosting Static Website using S3 in AWS
    • Exploits & Researches of ICSS Team Members
      • Samiran Santra
        • School Management Script 3.0.4 – Authentication Bypass | CVE-2018-7477
      • Pritam Mukherjee
        • Bug found in The Website of Mediamarkup.com
        • Bug found in The Website of Vista
        • Bug found in The Website of University of Victoria
        • Vulnerability found in The Website of Nokia
        • Vulnerability found in The Website of ASUS
      • Prasenjit Kanti Paul
        • CVE-2019-6146 Content Gateway: XSS via Host Header Injection Vulnerability
        • Multi religion Responsive Matrimonial 4.7.2 – Cross-Site Scripting
        • Learning and Examination Management System – Cross-Site Scripting | CVE-2018-6866
        • DVD X Player Standard 5.5.3.9 – Buffer Overflow | CVE-2018-9128
  • Media Coverage
  • Blog
    • Service
      • DNS Threats Expected to Surge Over The Holidays
      • Know-about-vapt-in-2021 & AI
      • 5 reasons why you should get your mobile applications penetration tested
    • Education
  • Contact Us
  • Location-Service
    • Bangalore
      • Network Penetration Testing - NPT
      • Web Penetration Testing - WAPT
      • Mobile App Penetration Testing
      • VAPT Service
    • Hyderabad
      • Network Penetration Testing - NPT
      • Web Penetration Testing - WAPT
      • Mobile App Penetration Testing
    • Delhi
      • Network Penetration Testing - NPT
      • Web Penetration Testing - WAPT
      • Mobile App Penetration Testing
  • Location-Education
    • Kolkata
      • Ethical-Hacking-in-kolkata
      • CCNA -Training-in-kolkata
      • Java -Training-in-kolkata
      • Aws-certification -Training-in-kolkata
      • Machine-Learning -Training-in-kolkata
      • Ceh -Training-in-kolkata
      • Python -Training-in-kolkata
      • Android -Training-in-kolkata
      • Azure -Training-in-kolkata
      • Iot -Training-in-kolkata
      • Diploma-in-cyber-security -Training-in-kolkata
      • Diploma-in-advance-cyber-security -Training-in-kolkata
      • Django -Training-in-kolkata
      • Web-penetration-testing -Training-in-kolkata
      • Network-penetration-testing -Training-in-kolkata
    • Bangalore
      • Machine-Learning-Training-in-bangalore
      • Ethical-Hacking -Training-in-bangalore
      • Ceh -Training-in-bangalore
      • Python-certification -Training-in-bangalore
      • Ccna -Training-in-bangalore
      • Android -Training-in-bangalore
      • Aws-Training-in-bangalore
    • Hyderabad
      • Ceh-Training-in-hyderabad
      • Ethical-Hacking -Training-in-hyderabad
      • Machine-Learning -Training-in-hyderabad
      • Ccna-Training-in-hyderabad
    • Mumbai
    • Bhubaneswar
    • Siliguri
    • Delhi
    • Chennai
    • Dhanbad
    • Dubai
    • Chandigarh
    • Pune
    • Ranchi
        • CEHP
        • Bug found in The Website of Mediamarkup.com
        • Bug found in The Website of Vista
        • Bug found in The Website of University of Victoria
        • Vulnerability found in The Website of Nokia
        • Vulnerability found in The Website of ASUS
  • Home
  • Security Products
    • S.A.V.E
    • Marg Darshak
  • Services
    • Compliance Services
      • GDPR Service
    • VAPT Services
      • Network Penetration Testing - NPT
      • Web Penetration Testing - WAPT
      • Android App Penetration Testing
      • ios App Penetration Testing
      • Security Operations Center - SOC
      • Data Recovary
      • Source code review
      • VAPT Services
  • Training Programs
    • Cyber Security courses
      • C | EH v10 - Certified Ethical Hacker Training
      • Ethical Hacking - C | EHP
      • E | CSA | EC - Council Certified Security Analysis
      • C | SWD - Certified Secure Web Developer
      • Iot Penetration Testing Training
      • Network Penetration Testing - C | NPT
      • Web Application Penetration Testing - c | WAI
      • Reserve Engeneering and Malware Analysis Co
      • Android Penetration Testing - C | APT
      • Computer Forensic - C | HFI
      • Diploma in Advance Cyber Security
      • Diploma in Cyber Security
      • Diploma in Advanced Cloud & Network Security
      • Diploma in Network Security - D | NS
      • Diploma in Web Application Security - D | WAS
      • Diploma in Cloud Infrastructure Management
    • Networking Courses
      • CCNA | Cisco Certified Network Associate
      • CCNP Certification
    • Programming Course
      • Python Programming Course - C | PP
      • Python Programming (Advance) - C | APP
      • Certified Django Developer - C | DD
    • Cloud Computing Courses (AWS | Microsoft Azur..)
      • Amazon Web Services Training - C | AWSD
      • Amazon Web Services (Advance) Training - C | AAWSD
      • Microsoft Azure Training - C | AP
      • DevOps Certification
      • Embedded System & Robotics - C | ESRP
    • Machine Learning & Data Analysis Training
    • Machine Learning Using R - C | MLUR
    • Internet of Things Training - C | IOTP
    • Andorid Training - C | AD
    • JAVA Training (Basic + Advance)
    • ISO/IEC 27001 | Lead Auditor Training
  • Clients
  • Company
    • Company Details
    • Campus Representative
    • Campus Placement
    • Workshop
    • Tutorials
    • Student Feedback
    • Bug Bounty Program
    • Franchisee
    • Next Batch
  • Media Coverage
  • Verify Your Certificate
  • Career
  • Location
    • Courses
      • Siliguri
      • Dubai
      • Bhubaneswar
      • Pune
      • Bangalaore
  • Contact

Securing Your World Digitally

Where Security comes
at the cost of convenience

Making Cyber Security Convenient for every organization.

ICSS simplifying cyber security

Secured Artificial Intelligence Based
Vulnerability Assessment Tool for Enterprise

s.a.v.e

Secured Artificial Intelligence Based
Vulnerability Assessment Tool for Enterprise

SAVE is an artificial intelligence based security risk assessment tool for enterprise which aims to provide a one stop solution for the top level managements of organizations. Quantifying the cyber risk and suggesting best possible rectification is right now the game changer in the cyber space.

Read More

Cyber Security managed services

ICSS is an Enterprise Cyber Security Platforms company with two verticals.

Cyber Security & Technical Education

Network Penetration Testing
VAPT on Networks, Servers & Data Centers
Web Application Penetration Testing
VAPT on Software’s, website & Applications
Android Application/ App Penetration Testing
VAPT on Android Applications
IOS Application / App Penetration Testing
VAPT on ISO Applications
Cloud Penetration Testing
VAPT on cloud based applications
IOT Penetration Testing
VAPT on IOT based Applications
GDPR Compliance
Make your company GDPR compliant
ISO 27001 Compliance
Make your company ISO 27001-2013 compliant
PCI-DSS Compliance
Make your company PCI-DSS compliant
HIPAA Compliance
Make your organization HIPAA compliant

Cyber Security
Managed Services

Don’t Believe us?
Ask them.

Brands that trust our Competence

KFC
MOL
NALCO
ODISHA POPULATION BOARD
Sharing valuable insight in
solving cyber crime

Media appearances

Jessica Hernandez & the Deltas - Dead Brains
Jessica Hernandez & the Deltas - Dead Brains
Barbatuques - CD Tum Pá - Sambalelê
Eleanor Turner plays Baroque Flamenco
Know the latest news on cyber security and trends on new emerging technologies

Blogs & research findings

Aws launched in 2006 from the international infrastructure

aws s3 security scanning tool aws bucket dump

Read more
Admin
April 5, 2018
0
Privacy Policy