Tabletop exercises Architecture and Guardrails
RCCE students will learn incident detection, containment procedures, evidence preservation, communication protocols, and post-incident analysis. RCCE students will learn to respond to security incidents with structured methodologies, coordinate cross-functional teams under pressure, execute containment and recovery operations, and drive continuous improvement through thorough post-incident reviews. This architecture course teaches secure system design using proven patterns, guardrails, and reference architectures. At an expert level, RCCE students will learn to evaluate design options against security requirements, make informed trade-off decisions, and build systems that are resilient by design. Students gain the architectural thinking skills needed for security engineering and solution design roles.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Tabletop exercises Architecture and Guardrails
- Design a scalable privilege management architecture with policy and enforcement
- Execute hands-on tasks for learning objectives — covering rules for PCI, HIPAA, PII protection.
- Design a scalable privilege management architecture with policy and enforcement, including rules for PCI, HIPAA, PII protection.
- Integrate privilege controls with identity providers and SIEM telemetry, including rules for PCI, HIPAA, PII protection.
- Execute hands-on tasks for dlp defined — covering Technology and processes preventing unauthorized data exposure.
- Explain DLP Architecture Overview fundamentals — covering Agent-based monitoring, USB/print/clipboard, Inline/tap inspection of.
- Execute hands-on tasks for endpoint dlp — covering Agent-based monitoring.
- Execute hands-on tasks for network dlp — covering Inline/tap inspection of.
- Execute hands-on tasks for cloud dlp — covering API-based SaaS.
- Execute hands-on tasks for email dlp gateway — covering Pre-delivery content scanning of outbound messages.
- Execute hands-on tasks for data classification framework
| Module 01 | DLP Architecture and Guardrails |
| Module 02 | Data Loss Prevention Strategy, Architecture, and Operations |
| Module 03 | Learning Objectives |
| Module 04 | DLP Strategy & Architecture |
| Module 05 | Integrate DLP controls with SIEM and SOAR |
| Module 06 | DLP Defined |
| Module 07 | DLP Architecture Overview |
| Module 08 | Endpoint DLP |
| Module 09 | Network DLP |
| Module 10 | Cloud DLP |
| Module 11 | Email DLP Gateway |
| Module 12 | Data Classification Framework |
| Module 13 | Top Secret |
| Module 14 | Content Inspection Engines |
All hands-on labs run on Rocheston Rose X OS. Students practice tabletop exercises architecture and guardrails by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Design a scalable privilege management architecture with policy and enforcement
- Lab 2: Design a scalable privilege management architecture with policy and enforcement
- Lab 3: Execute hands-on tasks for learning objectives
- Lab 4: Design a scalable privilege management architecture with policy and enforcement
- Lab 5: Integrate privilege controls with identity providers and SIEM telemetry
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Tabletop exercises Architecture and Guardrails, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI