RCCE Course
Course #365

Hands-On Misconfigurations

📊 Level: Advanced
⏱️ Duration: 2 Days
🏷️ Track: Cloud Security
📋 Prerequisites: Cloud foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn cloud and infrastructure misconfiguration detection, prevention, and remediation including CSPM deployment, configuration baseline management, and automated remediation. RCCE students will learn to identify common misconfigurations across cloud platforms including public S3 buckets, overly permissive security groups, unencrypted data stores, and misconfigured identity policies, deploy cloud security posture management tools, establish configuration baselines and detect drift, implement automated remediation for critical misconfigurations, prioritize misconfiguration findings by exploitability and business impact, and build organizational processes that prevent misconfigurations from reaching production. This practice-intensive course emphasizes applied skills through lab exercises, real-world scenarios, and production-realistic workflows. At an expert level, RCCE students will learn by doing, building muscle memory and practical confidence through repeated hands-on engagement. Students complete exercises that mirror actual workplace tasks, ensuring skills transfer directly to their professional roles.

🎯 Target Audience
  • Cloud Security Architects and Engineers
  • DevSecOps and Platform Engineers
  • Identity and Access Management Specialists
  • Security Analysts securing cloud workloads
  • Professionals implementing Hands-On Misconfigurations
🧠 What You Will Learn
  • Execute hands-on tasks for hands-on misconfigurations
  • Explain Module Overview fundamentals
  • Execute hands-on tasks for what you will learn
  • Execute hands-on tasks for module approach — covering Identify misconfigurations across cloud platforms, Hands-on lab exercises throughout.
  • Execute hands-on tasks for the cloud misconfiguration landscape
  • Execute hands-on tasks for impact categories — covering Cloud complexity outpaces security teams.
  • Execute hands-on tasks for misconfiguration taxonomy
  • Execute hands-on tasks for high-severity categories
  • Execute hands-on tasks for medium-severity categories — covering Public storage buckets with sensitive data, Missing resource tags for ownership.
  • Integrate privilege controls with identity providers and SIEM telemetry, including Wildcard (*) permissions in policies, and AssumeRole chains enabling escalation.
  • Execute hands-on tasks for aws-specific iam risks — covering Wildcard (*) permissions in policies.
  • Execute hands-on tasks for azure-specific iam risks — covering Owner role assigned at subscription level.
📚 Course Outline
Module 01Hands-On Misconfigurations
Module 02Module Overview
Module 03What You Will Learn
Module 04Module Approach
Module 05The Cloud Misconfiguration Landscape
Module 06Impact Categories
Module 07Misconfiguration Taxonomy
Module 08High-Severity Categories
Module 09Medium-Severity Categories
Module 10Identity & Access Misconfigurations
Module 11AWS-Specific IAM Risks
Module 12Azure-Specific IAM Risks
Module 13Inventory Roles
Module 14Analyze Usage
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice hands-on misconfigurations by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for hands-on misconfigurations
  • Lab 2: Explain Module Overview fundamentals
  • Lab 3: Execute hands-on tasks for what you will learn
  • Lab 4: Execute hands-on tasks for module approach
  • Lab 5: Execute hands-on tasks for the cloud misconfiguration landscape
📊 Skill Level
Advanced
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Hands-On Misconfigurations, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI