RCCE Course
Course #161

Code signing Hardening Workshop

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: DevSecOps
📋 Prerequisites: DevSecOps foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn code signing implementation and management including certificate management, signing key protection, timestamp services, revocation procedures, and signature verification. RCCE students will learn to implement code signing for applications, scripts, and container images, manage signing keys using hardware security modules and key management services, configure certificate lifecycle management including rotation and revocation, verify code signatures in deployment pipelines, detect and respond to unauthorized code signing, implement code signing policies across development teams, and integrate code signing into automated build and release workflows. This hands-on hardening course focuses on reducing attack surface through practical configuration changes and security guardrails. Building on core knowledge, RCCE students will learn to apply hardening baselines, validate configurations, and measure the security improvement achieved. Students walk away with actionable hardening checklists and the skills to maintain hardened configurations as environments evolve.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Code signing Hardening Workshop
🧠 What You Will Learn
  • Execute hands-on tasks for code signing hardening workshop
  • Execute hands-on tasks for advanced cyber defense mastery
  • Execute hands-on tasks for certificate mgmt
  • Execute hands-on tasks for key protection
  • Integrate privilege controls with identity providers and SIEM telemetry
  • Execute hands-on tasks for signature verification
  • Execute hands-on tasks for code signing implementation
  • Execute hands-on tasks for signing key hardening
  • Build detections and response workflows for privilege escalation, including Mastery Targets.
  • Design a scalable privilege management architecture with policy and enforcement
  • Execute hands-on tasks for root certificate authority
  • Execute hands-on tasks for code signing certificate
📚 Course Outline
Module 01Code Signing Hardening Workshop
Module 02Advanced Cyber Defense Mastery
Module 03Certificate Mgmt
Module 04Key Protection
Module 05Pipeline Integration
Module 06Signature Verification
Module 07Code Signing Implementation
Module 08Signing Key Hardening
Module 09Verification & Detection
Module 10Code Signing Trust Chain Architecture
Module 11Root Certificate Authority
Module 12Code Signing Certificate
Module 13EV Code Signing
Module 14Certificate Lifecycle Management Workflow
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice code signing hardening workshop by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for code signing hardening workshop
  • Lab 2: Execute hands-on tasks for advanced cyber defense mastery
  • Lab 3: Execute hands-on tasks for certificate mgmt
  • Lab 4: Execute hands-on tasks for key protection
  • Lab 5: Integrate privilege controls with identity providers and SIEM telemetry
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Code signing Hardening Workshop, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI