RCCE Course
Course #219

Hands-On Authorization: In Practice

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: AppSec
📋 Prerequisites: Web basics
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn authorization security including access control models (RBAC, ABAC, ReBAC), privilege escalation testing, IDOR vulnerabilities, and authorization bypass techniques. RCCE students will learn to evaluate authorization implementations for horizontal and vertical privilege escalation, test for Insecure Direct Object References, assess role-based and attribute-based access control configurations, identify broken function-level authorization, implement secure authorization patterns, design authorization architectures that enforce least privilege, and build authorization testing into security assessment and development workflows. This practice-intensive course emphasizes applied skills through lab exercises, real-world scenarios, and production-realistic workflows. Building on core knowledge, RCCE students will learn by doing, building muscle memory and practical confidence through repeated hands-on engagement. Students complete exercises that mirror actual workplace tasks, ensuring skills transfer directly to their professional roles.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Hands-On Authorization: In Practice
🧠 What You Will Learn
  • Execute hands-on tasks for hands-on authorization:
  • Execute hands-on tasks for in practice
  • Execute hands-on tasks for learning objectives
  • Execute hands-on tasks for core skills
  • Execute hands-on tasks for applied outcomes — covering Practice-Intensive Focus.
  • Execute hands-on tasks for authorization fundamentals
  • Execute hands-on tasks for what is authorization? — covering Process of granting or denying access to resources.
  • Execute hands-on tasks for authentication vs authorization boundary — covering Authentication (AuthN).
  • Execute hands-on tasks for answers: who are you? — covering Evaluates access permissions.
  • Execute hands-on tasks for authorization decision components
  • Implement least-privilege enforcement across endpoints and roles
  • Execute hands-on tasks for scope api permissions — covering Just-in-time access grants.
📚 Course Outline
Module 01Hands-On Authorization:
Module 02In Practice
Module 03Learning Objectives
Module 04Core Skills
Module 05Applied Outcomes
Module 06Authorization Fundamentals
Module 07What Is Authorization?
Module 08Authentication vs Authorization Boundary
Module 09Answers: WHO are you?
Module 10Authorization Decision Components
Module 11Principle of Least Privilege
Module 12Scope API permissions
Module 13Role-Based Access Control (RBAC)
Module 14Alice (Admin)
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice hands-on authorization: in practice by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for hands-on authorization:
  • Lab 2: Execute hands-on tasks for in practice
  • Lab 3: Execute hands-on tasks for learning objectives
  • Lab 4: Execute hands-on tasks for core skills
  • Lab 5: Execute hands-on tasks for applied outcomes
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Hands-On Authorization: In Practice, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI