RCCE Course
Course #386

IOC vs TTP for Beginners

📊 Level: Beginner
⏱️ Duration: 2 Days
🏷️ Track: Threat Intelligence
📋 Prerequisites: None
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn the distinction between Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs), and how each type of intelligence drives different detection and response strategies. RCCE students will learn to collect, analyze, and operationalize both IOCs and TTPs, understand the relative longevity and value of each intelligence type using the Pyramid of Pain framework, develop IOC-based detection rules for rapid response and TTP-based detections for resilient defense, integrate both intelligence types into SIEM and EDR platforms, prioritize detection investments, and produce intelligence products that combine IOC and TTP analysis. Designed for students with no prior experience in this area, this course builds knowledge from the ground up with clear explanations, guided demonstrations, and progressive skill-building. Starting from foundational concepts, RCCE students will learn core concepts through practical examples that connect theory to real-world security operations. By completion, students will have the foundational knowledge and hands-on confidence needed to contribute in professional cybersecurity roles.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing IOC vs TTP for Beginners
🧠 What You Will Learn
  • Explain Course Overview fundamentals
  • Explain IOC Foundations fundamentals
  • Integrate privilege controls with identity providers and SIEM telemetry, including TTP Foundations.
  • Execute hands-on tasks for what is threat intelligence?
  • Execute hands-on tasks for two core intelligence types — covering Observable artifact of an attack, Examples: IP, hash, domain, URL, Describes how adversaries operate.
  • Execute hands-on tasks for ioc (indicator of compromise) — covering Observable artifact of an attack, Examples: IP, hash, domain, URL.
  • Execute hands-on tasks for ttp (tactics, techniques, procedures) — covering Describes how adversaries operate, Maps to MITRE ATT&CK framework.
  • Execute hands-on tasks for file hash
  • Execute hands-on tasks for tactics, techniques & procedures defined
  • Execute hands-on tasks for tactics (why)
  • Execute hands-on tasks for techniques (how)
  • Execute hands-on tasks for procedures (details) — covering Adversary's tactical goal.
📚 Course Outline
Module 01Course Overview
Module 02IOC Foundations
Module 03Integration & Operations
Module 04What Is Threat Intelligence?
Module 05Two Core Intelligence Types
Module 06IOC (Indicator of Compromise)
Module 07TTP (Tactics, Techniques, Procedures)
Module 08File Hash
Module 09Tactics, Techniques & Procedures Defined
Module 10Tactics (Why)
Module 11Techniques (How)
Module 12Procedures (Details)
Module 13Persistence, Exfiltration
Module 14DLL Side-Loading, Keylogging
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice ioc vs ttp for beginners by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Explain Course Overview fundamentals
  • Lab 2: Explain IOC Foundations fundamentals
  • Lab 3: Integrate privilege controls with identity providers and SIEM telemetry
  • Lab 4: Execute hands-on tasks for what is threat intelligence?
  • Lab 5: Execute hands-on tasks for two core intelligence types
📊 Skill Level
Beginner
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for IOC vs TTP for Beginners, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI