Deception Technology Foundations
RCCE students will learn how deception strategies create early-warning signals by placing decoy assets, false data, and controlled traps inside enterprise environments. RCCE students will learn to understand when deception works, where to place deceptive controls, how to reduce operational disruption, and how deception telemetry can strengthen detection and incident response outcomes. The course covers practical scenarios ranging from decoy planning to alert triage, validation, and operational measurement. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.
- SOC Analysts and Incident Responders
- Detection Engineers and SIEM Content Authors
- Threat Hunters improving adversary coverage
- Security Operations Team Leads
- Professionals implementing Deception Technology Foundations
- Explain Deception Technology Foundations fundamentals
- Explain Course Overview fundamentals
- Explain What you will learn in RCCE 1086 — Deception Technology Foundations fundamentals
- Execute hands-on tasks for learning objectives
- Execute hands-on tasks for course structure — covering Deploy decoy assets in enterprise environments.
- Execute hands-on tasks for what is deception technology?
- Execute hands-on tasks for core definition
- Execute hands-on tasks for key principles
- Execute hands-on tasks for business value — covering Early breach detection (pre-exfiltration).
- Execute hands-on tasks for key evolution insight — covering From research curiosity to enterprise-grade detection layer.
- Execute hands-on tasks for deception strategy principles
- Explain Decoy Asset Types Overview fundamentals
| Module 01 | Deception Technology Foundations |
| Module 02 | Course Overview |
| Module 03 | What you will learn in RCCE 1086 — Deception Technology Foundations |
| Module 04 | Learning Objectives |
| Module 05 | Course Structure |
| Module 06 | What Is Deception Technology? |
| Module 07 | Core Definition |
| Module 08 | Key Principles |
| Module 09 | Business Value |
| Module 10 | Key Evolution Insight |
| Module 11 | Deception Strategy Principles |
| Module 12 | Decoy Asset Types Overview |
| Module 13 | Honeypot Deep Dive |
| Module 14 | Low-Interaction Honeypots |
All hands-on labs run on Rocheston Rose X OS. Students practice deception technology foundations by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Explain Deception Technology Foundations fundamentals
- Lab 2: Explain Course Overview fundamentals
- Lab 3: Explain What you will learn in RCCE 1086 — Deception Technology Foundations fundamentals
- Lab 4: Execute hands-on tasks for learning objectives
- Lab 5: Execute hands-on tasks for course structure
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Deception Technology Foundations, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI