RCCE Course
Course #1086

Deception Technology Foundations

📊 Level: Beginner
⏱️ Duration: 2 Days
🏷️ Track: SOC
📋 Prerequisites: Foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn how deception strategies create early-warning signals by placing decoy assets, false data, and controlled traps inside enterprise environments. RCCE students will learn to understand when deception works, where to place deceptive controls, how to reduce operational disruption, and how deception telemetry can strengthen detection and incident response outcomes. The course covers practical scenarios ranging from decoy planning to alert triage, validation, and operational measurement. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.

🎯 Target Audience
  • SOC Analysts and Incident Responders
  • Detection Engineers and SIEM Content Authors
  • Threat Hunters improving adversary coverage
  • Security Operations Team Leads
  • Professionals implementing Deception Technology Foundations
🧠 What You Will Learn
  • Explain Deception Technology Foundations fundamentals
  • Explain Course Overview fundamentals
  • Explain What you will learn in RCCE 1086 — Deception Technology Foundations fundamentals
  • Execute hands-on tasks for learning objectives
  • Execute hands-on tasks for course structure — covering Deploy decoy assets in enterprise environments.
  • Execute hands-on tasks for what is deception technology?
  • Execute hands-on tasks for core definition
  • Execute hands-on tasks for key principles
  • Execute hands-on tasks for business value — covering Early breach detection (pre-exfiltration).
  • Execute hands-on tasks for key evolution insight — covering From research curiosity to enterprise-grade detection layer.
  • Execute hands-on tasks for deception strategy principles
  • Explain Decoy Asset Types Overview fundamentals
📚 Course Outline
Module 01Deception Technology Foundations
Module 02Course Overview
Module 03What you will learn in RCCE 1086 — Deception Technology Foundations
Module 04Learning Objectives
Module 05Course Structure
Module 06What Is Deception Technology?
Module 07Core Definition
Module 08Key Principles
Module 09Business Value
Module 10Key Evolution Insight
Module 11Deception Strategy Principles
Module 12Decoy Asset Types Overview
Module 13Honeypot Deep Dive
Module 14Low-Interaction Honeypots
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice deception technology foundations by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Explain Deception Technology Foundations fundamentals
  • Lab 2: Explain Course Overview fundamentals
  • Lab 3: Explain What you will learn in RCCE 1086 — Deception Technology Foundations fundamentals
  • Lab 4: Execute hands-on tasks for learning objectives
  • Lab 5: Execute hands-on tasks for course structure
📊 Skill Level
Beginner
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Deception Technology Foundations, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI