RCCE Course
Course #61

MFA Operations Playbook

📊 Level: Beginner
⏱️ Duration: 2 Days
🏷️ Track: IAM
📋 Prerequisites: None
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn multi-factor authentication technologies, deployment strategies, and attack resistance including TOTP, FIDO2/WebAuthn, push notifications, hardware tokens, and biometric authentication. RCCE students will learn to evaluate MFA methods by security strength and usability, deploy MFA across enterprise applications and remote access systems, configure MFA policies in identity providers, detect and respond to MFA bypass techniques including SIM swapping, MFA fatigue attacks, adversary-in-the-middle phishing, and real-time phishing proxies. The course covers MFA enrollment management, recovery procedures, and migration strategies from weaker to stronger authentication factors. This operations-focused course delivers production-ready playbooks, checklists, and standard operating procedures. Starting from foundational concepts, RCCE students will learn to build repeatable day-to-day operational workflows that ensure consistency and quality. Students receive templates and frameworks they can customize and deploy immediately in their security operations, reducing time to operational effectiveness.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing MFA Operations Playbook
🧠 What You Will Learn
  • Execute hands-on tasks for mfa operations playbook
  • Execute hands-on tasks for advanced cyber defense mastery
  • Execute hands-on tasks for course agenda
  • Explain Part 1: Foundations & Technologies fundamentals
  • Execute hands-on tasks for part 2: operations & mastery — covering MFA Fundamentals & Factor Types.
  • Build detections and response workflows for privilege escalation, including Enrollment Management Workflows.
  • Explain Authentication Factors Overview fundamentals
  • Execute hands-on tasks for how totp works — covering Shared secret generated during enrollment.
  • Execute hands-on tasks for push notification authentication — covering User initiates login at web/VPN portal.
  • Execute hands-on tasks for push mfa vendors — covering User initiates login at web/VPN portal.
  • Execute hands-on tasks for hardware security keys & tokens
  • Execute hands-on tasks for token types
📚 Course Outline
Module 01MFA Operations Playbook
Module 02Advanced Cyber Defense Mastery
Module 03Course Agenda
Module 04Part 1: Foundations & Technologies
Module 05Part 2: Operations & Mastery
Module 06MFA Bypass Techniques & Detection
Module 07Authentication Factors Overview
Module 08How TOTP Works
Module 09Push Notification Authentication
Module 10Push MFA Vendors
Module 11Hardware Security Keys & Tokens
Module 12Token Types
Module 13Deployment Considerations
Module 14Google Titan
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice mfa operations playbook by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for mfa operations playbook
  • Lab 2: Execute hands-on tasks for advanced cyber defense mastery
  • Lab 3: Execute hands-on tasks for course agenda
  • Lab 4: Explain Part 1: Foundations & Technologies fundamentals
  • Lab 5: Execute hands-on tasks for part 2: operations & mastery
📊 Skill Level
Beginner
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for MFA Operations Playbook, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI