RCCE Course
Course #126

Network testing Hardening Workshop

📊 Level: Advanced
⏱️ Duration: 2 Days
🏷️ Track: Offensive Security
📋 Prerequisites: Foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn network penetration testing methodologies including external and internal network testing, port scanning, service enumeration, vulnerability exploitation, lateral movement, and privilege escalation in network environments. RCCE students will learn to plan and scope network penetration tests, conduct host discovery and service enumeration, identify and exploit network service vulnerabilities, perform credential attacks against network authentication services, demonstrate lateral movement through network environments, escalate privileges to domain administrator access, document network test findings, and provide remediation guidance prioritized by business risk. This hands-on hardening course focuses on reducing attack surface through practical configuration changes and security guardrails. At an expert level, RCCE students will learn to apply hardening baselines, validate configurations, and measure the security improvement achieved. Students walk away with actionable hardening checklists and the skills to maintain hardened configurations as environments evolve.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Network testing Hardening Workshop
🧠 What You Will Learn
  • Execute hands-on tasks for network testing
  • Execute hands-on tasks for hardening workshop
  • Execute hands-on tasks for advanced cyber defense mastery
  • Explain Executive Overview fundamentals
  • Execute hands-on tasks for course mission
  • Execute hands-on tasks for key outcomes — covering Master network pentest methodology, Conduct full external/internal network.
  • Execute hands-on tasks for strategic importance
  • Execute hands-on tasks for attack surface reality
  • Execute hands-on tasks for compliance mandates
  • Execute hands-on tasks for defense multiplier — covering 73% of breaches exploit, DoD 8140 requires.
  • Execute hands-on tasks for core definitions
  • Execute hands-on tasks for network penetration testing
📚 Course Outline
Module 01Network Testing
Module 02Hardening Workshop
Module 03Advanced Cyber Defense Mastery
Module 04Executive Overview
Module 05Course Mission
Module 06Key Outcomes
Module 07Strategic Importance
Module 08Attack Surface Reality
Module 09Compliance Mandates
Module 10Defense Multiplier
Module 11Core Definitions
Module 12Network Penetration Testing
Module 13Attack Surface
Module 14Hardening Baseline
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice network testing hardening workshop by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for network testing
  • Lab 2: Execute hands-on tasks for hardening workshop
  • Lab 3: Execute hands-on tasks for advanced cyber defense mastery
  • Lab 4: Explain Executive Overview fundamentals
  • Lab 5: Execute hands-on tasks for course mission
📊 Skill Level
Advanced
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Network testing Hardening Workshop, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI