Artifact integrity Playbook for Teams: Field Guide
RCCE students will learn secure CI/CD pipelines, infrastructure as code security, container hardening, supply chain risk management, and automated security testing. RCCE students will learn to integrate security into every phase of the software development lifecycle, shift security left with automated tooling, protect build and deployment pipelines from supply chain attacks, and build security automation that scales with development velocity. This team-oriented course builds collaborative workflows and organizational playbooks for security operations. Building on core knowledge, RCCE students will learn to create and implement standardized procedures that enable consistent performance across team members and shifts. Students develop the documentation, communication, and coordination skills needed for effective team-based security operations.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Artifact integrity Playbook for Teams: Field Guide
- Execute hands-on tasks for artifact integrity playbook
- Explain Course Overview & Learning Objectives fundamentals
- Execute hands-on tasks for what you will master — covering Secure CI/CD pipeline architecture, Infrastructure as Code security patterns.
- Design a scalable privilege management architecture with policy and enforcement, including Infrastructure as Code security patterns.
- Execute hands-on tasks for team playbook skills — covering Standardized incident procedures, Cross-shift coordination workflows.
- Execute hands-on tasks for course structure — covering 6 modules spanning DevSecOps foundations, Intermediate level with hands-on labs.
- Explain DevSecOps Foundations fundamentals
- Design a scalable privilege management architecture with policy and enforcement
- Execute hands-on tasks for why shift left? — covering Bugs found in planning cost 1x to fix, Bugs found in testing cost 15x.
- Execute hands-on tasks for implementation keys — covering Embed security in IDE plugins, Pre-commit hooks for secret scanning.
- Execute hands-on tasks for embed security in ide plugins — covering Pre-commit hooks for secret scanning.
| Module 01 | Artifact Integrity Playbook |
| Module 02 | Course Overview & Learning Objectives |
| Module 03 | What You Will Master |
| Module 04 | Secure CI/CD pipeline architecture |
| Module 05 | Team Playbook Skills |
| Module 06 | Course Structure |
| Module 07 | DevSecOps Foundations |
| Module 08 | Shift-Left Security Model |
| Module 09 | Why Shift Left? |
| Module 10 | Implementation Keys |
| Module 11 | Embed security in IDE plugins |
| Module 12 | CI/CD Pipeline Architecture |
| Module 13 | Security Controls at Every Stage |
| Module 14 | Pipeline Security Controls Deep Dive |
All hands-on labs run on Rocheston Rose X OS. Students practice artifact integrity playbook for teams: field guide by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Execute hands-on tasks for artifact integrity playbook
- Lab 2: Explain Course Overview & Learning Objectives fundamentals
- Lab 3: Execute hands-on tasks for what you will master
- Lab 4: Design a scalable privilege management architecture with policy and enforcement
- Lab 5: Execute hands-on tasks for team playbook skills
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Artifact integrity Playbook for Teams: Field Guide, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI