Hands-On Lifecycle
RCCE students will learn the complete identity lifecycle from provisioning through deprovisioning, covering joiner-mover-leaver processes, account creation workflows, role-based access assignments, periodic access recertification, and timely account deactivation. RCCE students will learn to design identity lifecycle automation using identity governance platforms, implement approval workflows for access requests, detect orphaned and dormant accounts, enforce separation of duties, and integrate HR systems with identity providers to ensure access rights accurately reflect current employment status and job responsibilities. This practice-intensive course emphasizes applied skills through lab exercises, real-world scenarios, and production-realistic workflows. At an expert level, RCCE students will learn by doing, building muscle memory and practical confidence through repeated hands-on engagement. Students complete exercises that mirror actual workplace tasks, ensuring skills transfer directly to their professional roles.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Hands-On Lifecycle
- Integrate privilege controls with identity providers and SIEM telemetry
- Execute hands-on tasks for advanced cyber defense mastery
- Execute hands-on tasks for level: advanced
- Execute hands-on tasks for hands-on lab
- Explain Executive Overview fundamentals
- Execute hands-on tasks for course outcomes — covering end-to-end identity lifecycle automation.
- Measure attack surface reduction and program effectiveness
- Execute hands-on tasks for compliance alignment — covering Eliminate orphan account attack surface.
- Execute hands-on tasks for core definitions
- Design a scalable privilege management architecture with policy and enforcement
- Execute hands-on tasks for data flow pattern — covering HR event triggers identity creation/modification.
| Module 01 | Hands-On Identity Lifecycle |
| Module 02 | Advanced Cyber Defense Mastery |
| Module 03 | Level: Advanced |
| Module 04 | Hands-On Lab |
| Module 05 | Executive Overview |
| Module 06 | Course Outcomes |
| Module 07 | Security Risk Reduction |
| Module 08 | Compliance Alignment |
| Module 09 | Core Definitions |
| Module 10 | Identity Lifecycle |
| Module 11 | Identity Lifecycle Architecture |
| Module 12 | Data Flow Pattern |
| Module 13 | Joiner Process: Provisioning Workflows |
| Module 14 | Identity Create |
All hands-on labs run on Rocheston Rose X OS. Students practice hands-on lifecycle by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Integrate privilege controls with identity providers and SIEM telemetry
- Lab 2: Execute hands-on tasks for advanced cyber defense mastery
- Lab 3: Execute hands-on tasks for level: advanced
- Lab 4: Execute hands-on tasks for hands-on lab
- Lab 5: Explain Executive Overview fundamentals
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Hands-On Lifecycle, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI