RCCE Course
Course #1101

Authentication Abuse and Account Takeover Defense

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: IAM
📋 Prerequisites: IAM fundamentals
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn how attackers abuse login flows, password reset paths, token handling, federation trust, session persistence, and user behavior to take over accounts at scale. RCCE students will learn to detect abuse patterns, strengthen authentication workflows, protect recovery channels, reduce bot-driven attacks, and design layered defenses that reduce account compromise without destroying user experience. The course covers practical scenarios ranging from detection logic to control design, response playbooks, and tuning. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Authentication Abuse and Account Takeover Defense
🧠 What You Will Learn
  • Execute hands-on tasks for account takeover defense
  • Explain Course Overview fundamentals
  • Execute hands-on tasks for what you will learn
  • Execute hands-on tasks for course structure — covering 50+ slides with labs and artifacts.
  • Execute hands-on tasks for authentication fundamentals refresher
  • Execute hands-on tasks for knowledge factors
  • Execute hands-on tasks for possession factors
  • Execute hands-on tasks for inherence factors — covering Hardware tokens (FIDO2/U2F), Fingerprint biometrics.
  • Execute hands-on tasks for sms/email otp codes — covering Fingerprint biometrics.
  • Execute hands-on tasks for account takeover attack lifecycle — covering Recon, →.
  • Execute hands-on tasks for credential stuffing mechanics
  • Execute hands-on tasks for attack infrastructure — covering Residential proxy rotation, Browser fingerprint spoofing.
📚 Course Outline
Module 01Account Takeover Defense
Module 02Course Overview
Module 03What You Will Learn
Module 04Course Structure
Module 05Authentication Fundamentals Refresher
Module 06Knowledge Factors
Module 07Possession Factors
Module 08Inherence Factors
Module 09SMS/email OTP codes
Module 10Account Takeover Attack Lifecycle
Module 11Credential Stuffing Mechanics
Module 12Attack Infrastructure
Module 13Data Sources
Module 14Scale and Economics
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice authentication abuse and account takeover defense by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for account takeover defense
  • Lab 2: Explain Course Overview fundamentals
  • Lab 3: Execute hands-on tasks for what you will learn
  • Lab 4: Execute hands-on tasks for course structure
  • Lab 5: Execute hands-on tasks for authentication fundamentals refresher
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Authentication Abuse and Account Takeover Defense, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI