RCCE Course
Course #77

Hands-On IoT: In Practice

📊 Level: Beginner
⏱️ Duration: 2 Days
🏷️ Track: OT Security
📋 Prerequisites: None
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn Internet of Things security covering smart device vulnerabilities, IoT protocol analysis (MQTT, CoAP, Zigbee, Z-Wave), firmware security assessment, IoT network segmentation, and cloud-connected device risk management. RCCE students will learn to assess IoT device security posture, identify common IoT vulnerabilities including default credentials, insecure update mechanisms, unencrypted communications, and insufficient access controls. The course covers IoT-specific threat modeling, secure IoT deployment architectures, monitoring IoT device behavior for anomalies, and responding to incidents involving compromised IoT devices in enterprise and industrial environments. This practice-intensive course emphasizes applied skills through lab exercises, real-world scenarios, and production-realistic workflows. Starting from foundational concepts, RCCE students will learn by doing, building muscle memory and practical confidence through repeated hands-on engagement. Students complete exercises that mirror actual workplace tasks, ensuring skills transfer directly to their professional roles.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Hands-On IoT: In Practice
🧠 What You Will Learn
  • Execute hands-on tasks for advanced cyber defense mastery
  • Execute hands-on tasks for device security
  • Design a scalable privilege management architecture with policy and enforcement
  • Execute hands-on tasks for hands-on labs
  • Explain Executive Overview fundamentals
  • Execute hands-on tasks for traffic unencrypted — covering IoT devices expand attack surface exponentially.
  • Execute hands-on tasks for iot security market — covering IoT devices expand attack surface exponentially.
  • Execute hands-on tasks for business risk
  • Execute hands-on tasks for strategic value — covering IoT breaches cost avg $330K per incident, Proactive defense reduces incident costs 60%.
  • Execute hands-on tasks for operational disruption in ics/ot environments — covering Proactive defense reduces incident costs 60%.
  • Execute hands-on tasks for edge computing
  • Execute hands-on tasks for smart device vulnerabilities
📚 Course Outline
Module 01Advanced Cyber Defense Mastery
Module 02Device Security
Module 03Threat Modeling
Module 04Hands-On Labs
Module 05Executive Overview
Module 06Traffic Unencrypted
Module 07IoT Security Market
Module 08Business Risk
Module 09Strategic Value
Module 10Operational disruption in ICS/OT environments
Module 11Edge Computing
Module 12Smart Device Vulnerabilities
Module 13CoAP (Constrained Application Protocol)
Module 14Security Concerns
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice hands-on iot: in practice by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for advanced cyber defense mastery
  • Lab 2: Execute hands-on tasks for device security
  • Lab 3: Design a scalable privilege management architecture with policy and enforcement
  • Lab 4: Execute hands-on tasks for hands-on labs
  • Lab 5: Explain Executive Overview fundamentals
📊 Skill Level
Beginner
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Hands-On IoT: In Practice, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI