Phishing infrastructure Threats, Tactics, and Defenses
RCCE students will learn threat intelligence lifecycle, indicator analysis, adversary profiling, intelligence sharing frameworks, and strategic threat reporting. RCCE students will learn to transform raw threat data into actionable intelligence, profile adversary campaigns and infrastructure, prioritize threats based on organizational risk, produce intelligence products for diverse audiences, and accelerate organizational detection and response capabilities. This threat-focused course teaches students to think like adversaries while building robust defenses. Starting from foundational concepts, RCCE students will learn to analyze attack techniques, build detection logic, and implement defensive strategies that proactively identify threats before they cause damage. Students develop a threat-informed mindset that drives better security decisions across all operational activities.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Phishing infrastructure Threats, Tactics, and Defenses
- Execute hands-on tasks for knowledge goals — covering ICS environments for vulnerabilities.
- Execute hands-on tasks for skill goals — covering defense-in-depth for ICS.
- Execute hands-on tasks for threat-informed mindset — covering Think like adversaries to build defenses.
- Explain Industrial Control Systems Overview fundamentals
- Execute hands-on tasks for plc/rtu — covering Supervisory control & data.
- Design a scalable privilege management architecture with policy and enforcement
- Execute hands-on tasks for level 5: enterprise
- Execute hands-on tasks for level 4: business planning
- Execute hands-on tasks for level 3: site operations
- Execute hands-on tasks for level 2: supervisory
- Execute hands-on tasks for plc programming languages — covering Ladder Logic (LD) — relay-based.
- Execute hands-on tasks for plc security risks — covering No authentication on programming ports.
| Module 01 | Knowledge Goals |
| Module 02 | Skill Goals |
| Module 03 | Threat-Informed Mindset |
| Module 04 | Industrial Control Systems Overview |
| Module 05 | PLC/RTU |
| Module 06 | The Purdue Enterprise Reference Architecture |
| Module 07 | Level 5: Enterprise |
| Module 08 | Level 4: Business Planning |
| Module 09 | Level 3: Site Operations |
| Module 10 | Level 2: Supervisory |
| Module 11 | PLC Programming Languages |
| Module 12 | PLC Security Risks |
| Module 13 | PLC Hardening Measures |
| Module 14 | DCS Architecture and Protection |
All hands-on labs run on Rocheston Rose X OS. Students practice phishing infrastructure threats, tactics, and defenses by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Execute hands-on tasks for knowledge goals
- Lab 2: Execute hands-on tasks for skill goals
- Lab 3: Execute hands-on tasks for threat-informed mindset
- Lab 4: Explain Industrial Control Systems Overview fundamentals
- Lab 5: Execute hands-on tasks for plc/rtu
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Phishing infrastructure Threats, Tactics, and Defenses, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI