BCP Hardening Workshop
RCCE students will learn business continuity planning including business impact analysis, continuity strategy development, plan documentation, testing and exercising, and plan maintenance. RCCE students will learn to conduct business impact assessments to identify critical business functions and their recovery time objectives, develop continuity strategies for various disruption scenarios, create actionable business continuity plans, design and facilitate continuity exercises, evaluate exercise results, maintain plans through regular reviews and updates, and integrate business continuity with disaster recovery and crisis management programs. This hands-on hardening course focuses on reducing attack surface through practical configuration changes and security guardrails. Building on core knowledge, RCCE students will learn to apply hardening baselines, validate configurations, and measure the security improvement achieved. Students walk away with actionable hardening checklists and the skills to maintain hardened configurations as environments evolve.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing BCP Hardening Workshop
- Measure attack surface reduction and program effectiveness
- Execute hands-on tasks for practical configuration & security guardrails
- Execute hands-on tasks for business impact analysis — covering Identify critical business functions, recovery time objectives.
- Execute hands-on tasks for continuity strategy development — covering strategies for disruption scenarios, Align continuity with risk appetite.
- Execute hands-on tasks for plan documentation & testing — covering Create actionable BCP documents, and facilitate exercises.
- Execute hands-on tasks for create actionable bcp documents — covering and facilitate exercises.
- Execute hands-on tasks for hardening & maintenance — covering Apply hardening baselines to BCP systems, configurations continuously.
- Execute hands-on tasks for apply hardening baselines to bcp systems — covering configurations continuously.
- Explain Topic Map Overview fundamentals — covering Core concepts and frameworks.
- Execute hands-on tasks for 2. business impact analysis — covering Critical function identification.
- Execute hands-on tasks for 1. bcp fundamentals — covering Core concepts and frameworks.
- Design a scalable privilege management architecture with policy and enforcement, including Threat landscape analysis.
| Module 01 | Business Continuity Planning: Attack Surface Reduction Through |
| Module 02 | Practical Configuration & Security Guardrails |
| Module 03 | Business Impact Analysis |
| Module 04 | Continuity Strategy Development |
| Module 05 | Plan Documentation & Testing |
| Module 06 | Create actionable BCP documents |
| Module 07 | Hardening & Maintenance |
| Module 08 | Apply hardening baselines to BCP systems |
| Module 09 | Topic Map Overview |
| Module 10 | 2. Business Impact Analysis |
| Module 11 | 1. BCP Fundamentals |
| Module 12 | 4. Continuity Strategy Design |
| Module 13 | 6. BCP Hardening Baselines |
| Module 14 | Roles, responsibilities, RACI |
All hands-on labs run on Rocheston Rose X OS. Students practice bcp hardening workshop by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Measure attack surface reduction and program effectiveness
- Lab 2: Execute hands-on tasks for practical configuration & security guardrails
- Lab 3: Execute hands-on tasks for business impact analysis
- Lab 4: Execute hands-on tasks for continuity strategy development
- Lab 5: Execute hands-on tasks for plan documentation & testing
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for BCP Hardening Workshop, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI