Designing Secure Network Infrastructures
RCCE students will learn segmentation strategies and defense-in-depth network design. RCCE students will learn to apply industry-standard tools and techniques to identify weaknesses and verify security controls. The course covers practical scenarios ranging from initial setup to final reporting. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Designing Secure Network Infrastructures
- Design a scalable privilege management architecture with policy and enforcement
- Explain Course Overview fundamentals
- Execute hands-on tasks for course scope — covering Network segmentation, Defense-in-depth architecture.
- Execute hands-on tasks for learning approach — covering Concept explanation with.
- Execute hands-on tasks for tcp/ip fundamentals — covering Basic routing and switching.
- Execute hands-on tasks for core principles
- Design a scalable privilege management architecture with policy and enforcement, including Least privilege access by default, and Perimeter security controls.
- Execute hands-on tasks for physical layer — covering Facility access controls, Cable plant security.
- Execute hands-on tasks for network layer — covering Segmentation and zoning, Firewall policy enforcement.
| Module 01 | Designing Secure Network |
| Module 02 | Course Overview |
| Module 03 | Course Scope |
| Module 04 | Learning Approach |
| Module 05 | TCP/IP fundamentals |
| Module 06 | Network Security Architecture Fundamentals |
| Module 07 | Core Principles |
| Module 08 | Architecture Layers |
| Module 09 | Design Drivers |
| Module 10 | Defense-in-Depth Model |
| Module 11 | Physical Layer |
| Module 12 | Network Layer |
| Module 13 | Application Layer |
| Module 14 | WAF and API gateways |
All hands-on labs run on Rocheston Rose X OS. Students practice designing secure network infrastructures by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Design a scalable privilege management architecture with policy and enforcement
- Lab 2: Explain Course Overview fundamentals
- Lab 3: Execute hands-on tasks for course scope
- Lab 4: Execute hands-on tasks for learning approach
- Lab 5: Execute hands-on tasks for tcp/ip fundamentals
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Designing Secure Network Infrastructures, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI