RCCE Course
Course #954

Phishing infrastructure Threats, Tactics, and Defenses

📊 Level: Beginner
⏱️ Duration: 2 Days
🏷️ Track: Threat Intelligence
📋 Prerequisites: None
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn threat intelligence lifecycle, indicator analysis, adversary profiling, intelligence sharing frameworks, and strategic threat reporting. RCCE students will learn to transform raw threat data into actionable intelligence, profile adversary campaigns and infrastructure, prioritize threats based on organizational risk, produce intelligence products for diverse audiences, and accelerate organizational detection and response capabilities. This threat-focused course teaches students to think like adversaries while building robust defenses. Starting from foundational concepts, RCCE students will learn to analyze attack techniques, build detection logic, and implement defensive strategies that proactively identify threats before they cause damage. Students develop a threat-informed mindset that drives better security decisions across all operational activities.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Phishing infrastructure Threats, Tactics, and Defenses
🧠 What You Will Learn
  • Execute hands-on tasks for knowledge goals — covering ICS environments for vulnerabilities.
  • Execute hands-on tasks for skill goals — covering defense-in-depth for ICS.
  • Execute hands-on tasks for threat-informed mindset — covering Think like adversaries to build defenses.
  • Explain Industrial Control Systems Overview fundamentals
  • Execute hands-on tasks for plc/rtu — covering Supervisory control & data.
  • Design a scalable privilege management architecture with policy and enforcement
  • Execute hands-on tasks for level 5: enterprise
  • Execute hands-on tasks for level 4: business planning
  • Execute hands-on tasks for level 3: site operations
  • Execute hands-on tasks for level 2: supervisory
  • Execute hands-on tasks for plc programming languages — covering Ladder Logic (LD) — relay-based.
  • Execute hands-on tasks for plc security risks — covering No authentication on programming ports.
📚 Course Outline
Module 01Knowledge Goals
Module 02Skill Goals
Module 03Threat-Informed Mindset
Module 04Industrial Control Systems Overview
Module 05PLC/RTU
Module 06The Purdue Enterprise Reference Architecture
Module 07Level 5: Enterprise
Module 08Level 4: Business Planning
Module 09Level 3: Site Operations
Module 10Level 2: Supervisory
Module 11PLC Programming Languages
Module 12PLC Security Risks
Module 13PLC Hardening Measures
Module 14DCS Architecture and Protection
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice phishing infrastructure threats, tactics, and defenses by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for knowledge goals
  • Lab 2: Execute hands-on tasks for skill goals
  • Lab 3: Execute hands-on tasks for threat-informed mindset
  • Lab 4: Explain Industrial Control Systems Overview fundamentals
  • Lab 5: Execute hands-on tasks for plc/rtu
📊 Skill Level
Beginner
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Phishing infrastructure Threats, Tactics, and Defenses, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI