[row]
[content_box custom_class=”bg1″]

[span6]

[/span6]

[span6]

Learn The Way You Want To Learn

Learn what you want, when it is most convenient for you. Our courses are completely online. The are both instructor-led and self-paced.…

[mp_button text=”
CHECK OUT OUR COURSE LIBRARY” link=”#” target=”false” icon=”none” icon_position=”left” full_width=”false” align=”left” mp_style_classes=”motopress-btn-color-silver motopress-btn-size-middle motopress-btn-rounded motopress-btn-icon-indent-small”]

[/span6]

[/content_box]
[/row]

[row]
[content_box custom_class=”motopress-bg-color-silver”]

[span6]

Products that work well at a low cost

Security products that give you a strategic view of your organizations IT Security posture.…

[mp_button text=”CHECK OUT OUR PRODUCTS” link=”#” target=”false” icon=”none” icon_position=”left” full_width=”false” align=”left” mp_style_classes=”motopress-btn-color-silver motopress-btn-size-middle motopress-btn-rounded motopress-btn-icon-indent-small”]

[/span6]

[span6]

[/span6]

[/content_box]
[/row]

[row]
[content_box custom_class=”bg1″]

Explore Strategic Security

[span3]

Blog

[/span3]

[span3]

Library

[/span3]

[span3]
page1_pic4

Keep In Touch

[/span3]

[span3]
page1_pic4

Submit Tickets

[/span3]

[/content_box]
[/row]

[row]

On the Web and Tablet

The strategic Security web site is crafted to work on every major device

Strategic Security for Tablet

[/row]

[row]
[content_box custom_class=”light-color”][span12]

CLIENT TESTIMONIALS

[recent_posts num=”3″ type=”team” post_format=”standard” meta=”false” thumb=”true” thumb_width=”70″ thumb_height=”70″ excerpt_count=”17″ custom_class=”three-col”]

[/span12][/content_box]
[/row]
[content_box custom_class=”bg1″]
[row]
[span5]

Our CEO

A little about the founder/CEO

[spacer]

Joseph McCray - Founder/CEO

Joseph McCray – Founder/CEO

Joseph McCray

Joe McCray is a US Air Force Veteran and has been in the IT Security field for over 12 years. He has worked extensively with the medical community, the financial industry, retail, the federal sector, the Department of Defense, 3-letter agencies, and several foreign governments. His technical background is very broad with nearly 20 industry certifications and experience covering networks, web applications, binary applications, mobile applications and his expertise is in bypassing IT Security Systems.

 

 

[/span5]
[span4]

Latest blog posts

[recent_posts num=”3″ post_format=”standard” meta=”true” thumb=”false” excerpt_count=”10″ custom_class=”news”]

 

[/span4]
[span3]

FEATURED

[accordions]
[accordion title=”Dolore ipsum com” visible=”yes”]

page1-pic5Dolore ipsum

Lorem ipsum dolor conset ctetur adip iscing elituis.

[/accordion]
[accordion title=”Dolore ipsum com”]

page1-pic5Dolore ipsum

Lorem ipsum dolor conset ctetur adip iscing elituis.

[/accordion]
[accordion title=”Dolore ipsum com”]

page1-pic5Dolore ipsum

Lorem ipsum dolor conset ctetur adip iscing elituis.

[/accordion]
[accordion title=”Dolore ipsum com”]

page1-pic5Dolore ipsum

Lorem ipsum dolor conset ctetur adip iscing elituis.

[/accordion]
[/accordions]

[/span3]
[/row]
[/content_box]