RCCE Course
Course #677

Firewalls Threats, Tactics, and Defenses

📊 Level: Advanced
⏱️ Duration: 2 Days
🏷️ Track: Network Security
📋 Prerequisites: Foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn firewall technologies including stateful packet inspection, next-generation firewalls, web application firewalls, network segmentation with firewalls, firewall rule management, and firewall log analysis. RCCE students will learn to design firewall architectures for enterprise networks, write and optimize firewall rules following least-privilege principles, troubleshoot firewall connectivity issues, analyze firewall logs for blocked and suspicious traffic, implement firewall change management processes, assess firewall configurations for security weaknesses, and respond to incidents involving firewall bypass or misconfiguration. This threat-focused course teaches students to think like adversaries while building robust defenses. At an expert level, RCCE students will learn to analyze attack techniques, build detection logic, and implement defensive strategies that proactively identify threats before they cause damage. Students develop a threat-informed mindset that drives better security decisions across all operational activities.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Firewalls Threats, Tactics, and Defenses
🧠 What You Will Learn
  • Execute hands-on tasks for firewalls: threats, tactics,
  • Explain Course Overview fundamentals
  • Execute hands-on tasks for focus areas — covering Firewall architecture design.
  • Execute hands-on tasks for threat skills — covering Adversary TTP analysis, Stateful & next-gen firewalls, Bypass technique detection.
  • Execute hands-on tasks for adversary ttp analysis — covering Stateful & next-gen firewalls.
  • Execute hands-on tasks for firewall fundamentals
  • Execute hands-on tasks for core definition
  • Execute hands-on tasks for key capabilities — covering Network security device filtering traffic, Packet filtering and inspection.
  • Execute hands-on tasks for evolution timeline — covering 1988: Packet filters → 1994: Stateful inspection → 2004: UTM appliances.
  • Explain Firewall Types Overview fundamentals
  • Execute hands-on tasks for packet filter — covering Operates at Layer 3-4, Stateless header inspection.
  • Execute hands-on tasks for stateful inspection — covering Tracks connection states, Understands session context.
📚 Course Outline
Module 01Firewalls: Threats, Tactics,
Module 02Course Overview
Module 03Focus Areas
Module 04Threat Skills
Module 05Adversary TTP analysis
Module 06Firewall Fundamentals
Module 07Core Definition
Module 08Key Capabilities
Module 09Evolution Timeline
Module 10Firewall Types Overview
Module 11Packet Filter
Module 12Stateful Inspection
Module 13Operates at Layer 3-4
Module 14Application Proxy
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice firewalls threats, tactics, and defenses by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for firewalls: threats, tactics,
  • Lab 2: Explain Course Overview fundamentals
  • Lab 3: Execute hands-on tasks for focus areas
  • Lab 4: Execute hands-on tasks for threat skills
  • Lab 5: Execute hands-on tasks for adversary ttp analysis
📊 Skill Level
Advanced
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Firewalls Threats, Tactics, and Defenses, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI