Identity Proofing and Secure Enrollment
RCCE students will learn how organizations verify identity during onboarding and enrollment by combining evidence checks, fraud controls, verification workflows, and assurance models. RCCE students will learn to assess enrollment risk, design identity proofing steps, protect recovery workflows, reduce impersonation opportunities, and align onboarding assurance with the sensitivity of downstream access. The course covers practical scenarios ranging from registration and verification to recovery, exception handling, and auditability. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Identity Proofing and Secure Enrollment
- Integrate privilege controls with identity providers and SIEM telemetry
- Integrate privilege controls with identity providers and SIEM telemetry, including Happens once at enrollment.
- Execute hands-on tasks for document validation techniques
- Execute hands-on tasks for visual inspection — covering Hologram, microprint, UV.
- Execute hands-on tasks for machine-readable zone — covering OCR extraction from MRZ.
- Execute hands-on tasks for chip verification — covering NFC read of ICAO e-.
- Execute hands-on tasks for database cross-check — covering Query issuing authority.
- Execute hands-on tasks for template matching — covering Compare against known.
- Build detections and response workflows for privilege escalation, including Font inconsistency and.
- Explain Enrollment Workflow Overview fundamentals
- Execute hands-on tasks for enrollment initiation and applicant intake — covering Applicant provides initial claim of.
| Module 01 | What Is Identity Proofing? |
| Module 02 | Identity Proofing |
| Module 03 | Document Validation Techniques |
| Module 04 | Visual Inspection |
| Module 05 | Machine-Readable Zone |
| Module 06 | Chip Verification |
| Module 07 | Database Cross-Check |
| Module 08 | Template Matching |
| Module 09 | Tamper Detection |
| Module 10 | Enrollment Workflow Overview |
| Module 11 | Enrollment Initiation and Applicant Intake |
| Module 12 | Remote Identity Proofing |
| Module 13 | Remote Proofing Channels |
| Module 14 | In-Person Identity Proofing |
All hands-on labs run on Rocheston Rose X OS. Students practice identity proofing and secure enrollment by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Integrate privilege controls with identity providers and SIEM telemetry
- Lab 2: Integrate privilege controls with identity providers and SIEM telemetry
- Lab 3: Execute hands-on tasks for document validation techniques
- Lab 4: Execute hands-on tasks for visual inspection
- Lab 5: Execute hands-on tasks for machine-readable zone
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Identity Proofing and Secure Enrollment, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI