RCCE Course
Course #740

OAuth/OIDC Architecture and Guardrails: Case Studies

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: IAM
📋 Prerequisites: IAM fundamentals
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn the OAuth 2.0 authorization framework and OpenID Connect authentication layer, covering authorization code flows, implicit flows, client credentials, PKCE extensions, token lifecycle management, and JWT structure and validation. RCCE students will learn to identify common OAuth/OIDC vulnerabilities including token theft, authorization code interception, redirect URI manipulation, scope escalation, and insufficient token validation. The course covers incident response for compromised OAuth tokens, revoking active sessions, investigating token abuse in logs, and implementing secure OAuth/OIDC configurations that prevent account takeover. This architecture course teaches secure system design using proven patterns, guardrails, and reference architectures. Building on core knowledge, RCCE students will learn to evaluate design options against security requirements, make informed trade-off decisions, and build systems that are resilient by design. Students gain the architectural thinking skills needed for security engineering and solution design roles.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing OAuth/OIDC Architecture and Guardrails: Case Studies
🧠 What You Will Learn
  • Design a scalable privilege management architecture with policy and enforcement
  • Explain Course Overview: OAuth/OIDC Architecture fundamentals
  • Execute hands-on tasks for learning objectives
  • Execute hands-on tasks for resource owner — covering End user who, Grants.
  • Execute hands-on tasks for client application — covering App requesting, Registered with.
  • Execute hands-on tasks for resource server — covering Hosts protected.
  • Execute hands-on tasks for authorization code flow (detailed)
  • Execute hands-on tasks for auth server
  • Execute hands-on tasks for auth code
  • Execute hands-on tasks for exchange code
  • Execute hands-on tasks for front-channel (browser) — covering GET /authorize with client_id, redirect_uri, state parameter prevents CSRF.
📚 Course Outline
Module 01OAuth/OIDC Architecture
Module 02Course Overview: OAuth/OIDC Architecture
Module 03Learning Objectives
Module 04Design secure OIDC configurations
Module 05Resource Owner
Module 06Client Application
Module 07Resource Server
Module 08Authorization Code Flow (Detailed)
Module 09Auth Server
Module 10Auth Code
Module 11Exchange Code
Module 12Front-Channel (Browser)
Module 13Back-Channel (Server)
Module 14Implicit Flow (Legacy)
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice oauth/oidc architecture and guardrails: case studies by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Design a scalable privilege management architecture with policy and enforcement
  • Lab 2: Explain Course Overview: OAuth/OIDC Architecture fundamentals
  • Lab 3: Execute hands-on tasks for learning objectives
  • Lab 4: Design a scalable privilege management architecture with policy and enforcement
  • Lab 5: Execute hands-on tasks for resource owner
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for OAuth/OIDC Architecture and Guardrails: Case Studies, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI