RCCE Course
Course #392

EDR Operations Playbook

📊 Level: Advanced
⏱️ Duration: 2 Days
🏷️ Track: Endpoint Security
📋 Prerequisites: Foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn Endpoint Detection and Response platform deployment, configuration, and operations including sensor deployment, detection rule management, automated response actions, and threat hunting with EDR telemetry. RCCE students will learn to deploy and manage EDR solutions across enterprise endpoints, configure detection rules for malware, lateral movement, and persistence techniques, implement automated response actions for containment, use EDR telemetry for proactive threat hunting, investigate alerts and trace attack chains through EDR data, tune EDR configurations to reduce false positives while maintaining detection coverage, and integrate EDR with SIEM and SOAR platforms. This operations-focused course delivers production-ready playbooks, checklists, and standard operating procedures. At an expert level, RCCE students will learn to build repeatable day-to-day operational workflows that ensure consistency and quality. Students receive templates and frameworks they can customize and deploy immediately in their security operations, reducing time to operational effectiveness.

🎯 Target Audience
  • Endpoint Security Engineers and EDR Analysts
  • Windows and macOS Administrators managing privileges
  • Identity and Access Management Engineers
  • IT Security Operations Leads reducing attack surface
  • Professionals implementing EDR Operations Playbook
🧠 What You Will Learn
  • Execute hands-on tasks for edr operations playbook
  • Build detections and response workflows for privilege escalation
  • Execute hands-on tasks for core functions — covering Endpoint Detection and Response, Telemetry collection from endpoints.
  • Build detections and response workflows for privilege escalation, including Telemetry collection from endpoints, and AV: signature-based, reactive, file-focused.
  • Execute hands-on tasks for edr vs traditional av — covering AV: signature-based, reactive, file-focused.
  • Explain EDR Architecture Overview fundamentals
  • Execute hands-on tasks for endpoint sensor layer
  • Execute hands-on tasks for data transport layer
  • Execute hands-on tasks for analytics engine
  • Execute hands-on tasks for management console
  • Execute hands-on tasks for process events — covering Creation, termination, injection.
📚 Course Outline
Module 01EDR Operations Playbook
Module 02Deployment, Detection, Response & Threat Hunting Operations
Module 03Core Functions
Module 04Endpoint Detection and Response
Module 05EDR vs Traditional AV
Module 06EDR Architecture Overview
Module 07Endpoint Sensor Layer
Module 08Data Transport Layer
Module 09Analytics Engine
Module 10Management Console
Module 11Response Orchestration
Module 12Process Events
Module 13File Operations
Module 14Network Activity
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice edr operations playbook by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for edr operations playbook
  • Lab 2: Build detections and response workflows for privilege escalation
  • Lab 3: Execute hands-on tasks for core functions
  • Lab 4: Build detections and response workflows for privilege escalation
  • Lab 5: Execute hands-on tasks for edr vs traditional av
📊 Skill Level
Advanced
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for EDR Operations Playbook, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI