RCCE Course
Course #374

Network Threats and Detection

📊 Level: Advanced
⏱️ Duration: 2 Days
🏷️ Track: Cloud Security
📋 Prerequisites: Cloud foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn cloud network security fundamentals including virtual network design, subnet architecture, security groups, network ACLs, load balancer security, CDN protection, and hybrid connectivity security. RCCE students will learn to design secure cloud network architectures across AWS VPC, Azure VNet, and GCP VPC, implement micro-segmentation strategies, configure web application firewalls for cloud workloads, secure inter-region and hybrid connections using VPN and private connectivity services, monitor cloud network traffic for anomalies, and troubleshoot cloud network security issues while maintaining least-privilege network access. This threat-focused course teaches students to think like adversaries while building robust defenses. At an expert level, RCCE students will learn to analyze attack techniques, build detection logic, and implement defensive strategies that proactively identify threats before they cause damage. Students develop a threat-informed mindset that drives better security decisions across all operational activities.

🎯 Target Audience
  • Cloud Security Architects and Engineers
  • DevSecOps and Platform Engineers
  • Identity and Access Management Specialists
  • Security Analysts securing cloud workloads
  • Professionals implementing Network Threats and Detection
🧠 What You Will Learn
  • Build detections and response workflows for privilege escalation
  • Explain Module Overview fundamentals
  • Execute hands-on tasks for core focus — covering Cloud network architecture security, Multi-cloud VPC/VNet design patterns.
  • Execute hands-on tasks for learning approach — covering Think like an adversary, defend like an engineer, Hands-on labs across AWS, Azure, GCP.
  • Execute hands-on tasks for key outcomes — covering secure cloud network architectures, micro-segmentation strategies.
  • Explain Cloud foundations (Module 7 series) fundamentals — covering Basic networking (TCP/IP, DNS, routing).
  • Explain Cloud Network Security Foundations fundamentals
  • Execute hands-on tasks for customer responsibility — covering Physical network infrastructure, Virtual network configuration.
  • Execute hands-on tasks for key principle — covering DDoS baseline protection (CSP).
  • Design a scalable privilege management architecture with policy and enforcement, including Logically isolated virtual network, and CIDR block allocation (/16 to /28).
  • Execute hands-on tasks for vpc fundamentals — covering Logically isolated virtual network, CIDR block allocation (/16 to /28).
  • Execute hands-on tasks for subnet strategy — covering Public subnets: Internet-facing resources, Private subnets: Backend and databases.
📚 Course Outline
Module 01Network Threats and Detection
Module 02Module Overview
Module 03Core Focus
Module 04Learning Approach
Module 05Key Outcomes
Module 06Cloud foundations (Module 7 series)
Module 07Cloud Network Security Foundations
Module 08Customer Responsibility
Module 09Key Principle
Module 10AWS VPC Architecture
Module 11VPC Fundamentals
Module 12Subnet Strategy
Module 13Public subnets: Internet-facing resources
Module 14Route Tables
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice network threats and detection by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Build detections and response workflows for privilege escalation
  • Lab 2: Explain Module Overview fundamentals
  • Lab 3: Execute hands-on tasks for core focus
  • Lab 4: Execute hands-on tasks for learning approach
  • Lab 5: Execute hands-on tasks for key outcomes
📊 Skill Level
Advanced
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Network Threats and Detection, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI