top of page
Cibersegurança

 Course Outline for E|CDE: 

  • Understanding DevOps Culture

  • Introduction to DevSecOps

  • DevSecOps Pipeline—Plan Stage

  • DevSecOps Pipeline—Code Stage

  • DevSecOps Pipeline—Build and Test Stage

  • DevSecOps Pipeline—Release and Deploy Stage

  • DevSecOps Pipeline—Operate and Monitor Stage

ecde
JUSTLOGOVECTORSCORPION2024

PARTNERSHIPS

​​​​​​Description:

 

The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry level and intermediate-level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.

EC-COUNCIL

With years of experience, EC-COUNCIL is today, one of the most renowned Cybersecurity Training Organizations in the World. SCORPIONSHIELD has a close partnership with the EC-COUNCIL, to provide a local academy in information security, for all customers and consultants, to be constantly upgraded in the necessary skills needed, to excel on InfoSec. SCORPIONSHIELD is an EC-COUNCIL Accredited Training Center ATC, as well as a Test Center TC, and our trainers are certified instructors from the EC-COUNCIL.

ISACA

ISACA, originally known as the Information Systems Audit and Control Association, now prefers to go by its acronym alone. It is an international professional association focused on IT governance. Established in 1969, ISACA has significantly grown over the years, offering certifications, training, and guidance on audit, governance, risk, compliance, cybersecurity, and privacy. ISACA's frameworks, like COBIT, are widely respected and used for managing and governing enterprise IT environments. The association also provides research, publications, and development programs to help professionals and organizations enhance their knowledge and application of information technology. ISACA's certifications, such as CISA and CISM, are recognized globally and are highly regarded in the fields of IT security, audit, risk management, and governance.

SCORPIONSHIELD PARTNERSHIP ISACA.png

CROWDSTRIKE

CrowdStrike is a leading provider of next-generation endpoint protection, threat intelligence, and response services.

Number 1 Gartner's Magic Quadrant and Forrester Quadrant 2024

The core of their offerings is the CrowdStrike Falcon platform, which effectively stops breaches by addressing both malware and non-malware threats. Key features of the platform include:

  • Cloud Native: Simplifies deployment by eliminating complex setup 

  • AI Powered: with instant visibility, enhancing security teams

  • Single Agent: one agent to deliver protection against breaches

  • World-Class: Offers detailed insights and attacks'.context 

  • 24/7 Threat Hunting: The Falcon OverWatch feature includes proactive threat hunting by an elite team always available 

  • Fully Managed and Easily Deployable: Offers a cost-effective solution that addresses the cybersecurity skills gap and allows for quick maturity in cybersecurity readiness.

FLASHPOINT

Flashpoint is the globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet. Flashpoint Intelligence Platform grants access to our archive of finished intelligence reports, data from illicit forums, marketplaces, chat services, blogs, paste sites, technical data, card shops, and vulnerabilities, in a single, finished intelligence experience. Our platform scales Flashpoint’s internal team of specialized, multilingual intelligence analysts’ ability to quickly provide responses to customers. Access finished intelligence and primary source data across illicit online communities used by Flashpoint experts to create those reports. Broaden the scope of intelligence beyond traditional threat detection, and gain scalable, contextual, rich results that help teams make better decisions and protect their ability to operate across the enterprise. 

flashpoint

RECORDED FUTURE

Recorded Future is the most comprehensive and independent threat intelligence cloud platform. It enables organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence. The company offers an extensive range of products and services tailored to enhance enterprise security. Their Intelligence Platform is central to their offerings, delivering comprehensive insights into threats by integrating a vast amount of threat data collected over more than a decade. This platform supports a variety of security needs from ransomware mitigation to digital risk protection, automating security workflows, and managing supply chain risks.
 

YOUR FUTURE
FUTURE

STRIKEREADY

StrikeReady is a cybersecurity firm that leverages artificial intelligence to enhance the efficiency and effectiveness of security operations management (SOM). Their platform provides a centralized command center that facilitates proactive defense and faster decision-making within Security Operations Centers (SOCs). Established in 2019, StrikeReady aims to transform SOC teams by offering tools that automate and streamline security processes, thus reducing complexity and increasing the speed of response to threats. This approach helps organizations manage and mitigate cybersecurity risks more effectively by enabling a shift from reactive to proactive security operations.

SILENT PUSH

strikeready
silentpush

Silent Push is a cybersecurity company focused on enhancing threat intelligence and digital risk protection. They use proprietary technology to monitor and identify potential cyber threats before they become active, aiming to improve the way organizations defend against global threats. Their platform provides advanced tools for threat detection and digital risk assessment, helping security teams proactively manage cyber risks. Silent Push's services include early detection feeds, threat hunting, risk scoring, integrate seamlessly with existing security systems through robust APIs. Introduced the concept of IOFAs - Indicators Of Future Attacks. 

CYMULATE

PERCEPTION POINT

Perception Point is a cybersecurity company known for its Prevention-as-a-Service solutions, designed to intercept content-based attacks across various collaboration channels like email, cloud storage, CRM apps, and messaging platforms. They focus on modernizing email security, particularly for cloud environments, and their platform is recognized for its efficiency in preventing threats such as phishing, Business Email Compromise (BEC), spam, and malware. The company's technology combines advanced AI with human-driven strategies to offer comprehensive protection. This includes real-time prevention capabilities and a managed incident response service that operates around the clock. Perception Point has been acknowledged in the Gartner Market Guide for Email Security, indicating its stature and innovation in cybersecurity.

Cymulate is a cybersecurity company specializing in exposure management and security validation. Established in 2016, Cymulate provides a platform that helps organizations assess and improve their cybersecurity posture through continuous and automated testing against the latest threats. Their technology allows companies to simulate cyber attacks across various vectors to identify vulnerabilities and mitigate them before they can be exploited by actual attackers. Cymulate's platform operationalizes the MITRE ATT&CK framework, providing end-to-end security management across the cyber kill chain. This includes generating and employing indicators of attack (IOAs) and indicators of compromise (IOCs) to enhance threat detection and response capabilities. The platform is designed to be user-friendly, accommodating various skill levels with customizable options that range from basic to advanced configurations, catering to both less technical users and seasoned cybersecurity professionals.

cymulate

For more information:

Privacy Notice (GDPR):

Information will not be shared and used exclusively to communicate.

bottom of page