RCCE Course
Course #874

Tabletop exercises Architecture and Guardrails

📊 Level: Advanced
⏱️ Duration: 2 Days
🏷️ Track: Incident Response
📋 Prerequisites: IR foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn incident detection, containment procedures, evidence preservation, communication protocols, and post-incident analysis. RCCE students will learn to respond to security incidents with structured methodologies, coordinate cross-functional teams under pressure, execute containment and recovery operations, and drive continuous improvement through thorough post-incident reviews. This architecture course teaches secure system design using proven patterns, guardrails, and reference architectures. At an expert level, RCCE students will learn to evaluate design options against security requirements, make informed trade-off decisions, and build systems that are resilient by design. Students gain the architectural thinking skills needed for security engineering and solution design roles.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Tabletop exercises Architecture and Guardrails
🧠 What You Will Learn
  • Design a scalable privilege management architecture with policy and enforcement
  • Execute hands-on tasks for learning objectives — covering rules for PCI, HIPAA, PII protection.
  • Design a scalable privilege management architecture with policy and enforcement, including rules for PCI, HIPAA, PII protection.
  • Integrate privilege controls with identity providers and SIEM telemetry, including rules for PCI, HIPAA, PII protection.
  • Execute hands-on tasks for dlp defined — covering Technology and processes preventing unauthorized data exposure.
  • Explain DLP Architecture Overview fundamentals — covering Agent-based monitoring, USB/print/clipboard, Inline/tap inspection of.
  • Execute hands-on tasks for endpoint dlp — covering Agent-based monitoring.
  • Execute hands-on tasks for network dlp — covering Inline/tap inspection of.
  • Execute hands-on tasks for cloud dlp — covering API-based SaaS.
  • Execute hands-on tasks for email dlp gateway — covering Pre-delivery content scanning of outbound messages.
  • Execute hands-on tasks for data classification framework
📚 Course Outline
Module 01DLP Architecture and Guardrails
Module 02Data Loss Prevention Strategy, Architecture, and Operations
Module 03Learning Objectives
Module 04DLP Strategy & Architecture
Module 05Integrate DLP controls with SIEM and SOAR
Module 06DLP Defined
Module 07DLP Architecture Overview
Module 08Endpoint DLP
Module 09Network DLP
Module 10Cloud DLP
Module 11Email DLP Gateway
Module 12Data Classification Framework
Module 13Top Secret
Module 14Content Inspection Engines
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice tabletop exercises architecture and guardrails by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Design a scalable privilege management architecture with policy and enforcement
  • Lab 2: Design a scalable privilege management architecture with policy and enforcement
  • Lab 3: Execute hands-on tasks for learning objectives
  • Lab 4: Design a scalable privilege management architecture with policy and enforcement
  • Lab 5: Integrate privilege controls with identity providers and SIEM telemetry
📊 Skill Level
Advanced
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Tabletop exercises Architecture and Guardrails, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI