Backups Threats, Tactics, and Defenses
RCCE students will learn business continuity planning, disaster recovery, ransomware preparedness, high availability architectures, and recovery testing. RCCE students will learn to design and implement resilient systems that maintain operations during disruptions, develop and validate recovery procedures, conduct realistic recovery exercises, and build organizational resilience that withstands ransomware, natural disasters, and infrastructure failures. This threat-focused course teaches students to think like adversaries while building robust defenses. At an expert level, RCCE students will learn to analyze attack techniques, build detection logic, and implement defensive strategies that proactively identify threats before they cause damage. Students develop a threat-informed mindset that drives better security decisions across all operational activities.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Backups Threats, Tactics, and Defenses
- Execute hands-on tasks for backups threats, tactics,
- Explain Course Overview fundamentals
- Execute hands-on tasks for business continuity
- Execute hands-on tasks for disaster recovery — covering Continuity planning frameworks, Recovery strategy design.
- Execute hands-on tasks for high availability — covering Threat actor TTPs analysis.
- Execute hands-on tasks for backup fundamentals & data classification
- Execute hands-on tasks for data classification tiers — covering Tier 1: Mission-critical (RPO < 1hr).
- Execute hands-on tasks for backup scope decisions — covering Identify data owners and custodians.
- Execute hands-on tasks for backup types: full, incremental, differential
- Execute hands-on tasks for full backup — covering Complete copy of all data.
- Execute hands-on tasks for incremental backup — covering Only changes since last.
- Execute hands-on tasks for differential backup — covering Changes since last full backup.
| Module 01 | Backups Threats, Tactics, |
| Module 02 | Course Overview |
| Module 03 | Business Continuity |
| Module 04 | Disaster Recovery |
| Module 05 | High Availability |
| Module 06 | Backup Fundamentals & Data Classification |
| Module 07 | Data Classification Tiers |
| Module 08 | Backup Scope Decisions |
| Module 09 | Backup Types: Full, Incremental, Differential |
| Module 10 | Full Backup |
| Module 11 | Incremental Backup |
| Module 12 | Differential Backup |
| Module 13 | Backup Type Comparison Matrix |
| Module 14 | Backup Speed |
All hands-on labs run on Rocheston Rose X OS. Students practice backups threats, tactics, and defenses by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Execute hands-on tasks for backups threats, tactics,
- Lab 2: Explain Course Overview fundamentals
- Lab 3: Execute hands-on tasks for business continuity
- Lab 4: Execute hands-on tasks for disaster recovery
- Lab 5: Execute hands-on tasks for high availability
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Backups Threats, Tactics, and Defenses, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI