RCCE Course
Course #120

OAuth/OIDC for Beginners: Field Guide

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: IAM
📋 Prerequisites: IAM fundamentals
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn the OAuth 2.0 authorization framework and OpenID Connect authentication layer, covering authorization code flows, implicit flows, client credentials, PKCE extensions, token lifecycle management, and JWT structure and validation. RCCE students will learn to identify common OAuth/OIDC vulnerabilities including token theft, authorization code interception, redirect URI manipulation, scope escalation, and insufficient token validation. The course covers incident response for compromised OAuth tokens, revoking active sessions, investigating token abuse in logs, and implementing secure OAuth/OIDC configurations that prevent account takeover. Designed for students with no prior experience in this area, this course builds knowledge from the ground up with clear explanations, guided demonstrations, and progressive skill-building. Building on core knowledge, RCCE students will learn core concepts through practical examples that connect theory to real-world security operations. By completion, students will have the foundational knowledge and hands-on confidence needed to contribute in professional cybersecurity roles.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing OAuth/OIDC for Beginners: Field Guide
🧠 What You Will Learn
  • Execute hands-on tasks for advanced cyber defense mastery
  • Execute hands-on tasks for level: intermediate
  • Execute hands-on tasks for duration: 6 hours
  • Explain Executive Overview fundamentals — covering OAuth 2.0 is the industry-standard authorization.
  • Execute hands-on tasks for why oauth/oidc matters in modern security — covering OAuth 2.0 is the industry-standard authorization.
  • Execute hands-on tasks for strategic importance
  • Execute hands-on tasks for oauth/oidc in the enterprise security landscape
  • Explain Zero Trust Foundation fundamentals
  • Execute hands-on tasks for cloud-native security
  • Execute hands-on tasks for regulatory compliance
  • Measure attack surface reduction and program effectiveness
  • Execute hands-on tasks for authorization framework — covering Delegates access to resources.
📚 Course Outline
Module 01Advanced Cyber Defense Mastery
Module 02Level: Intermediate
Module 03Duration: 6 Hours
Module 04Executive Overview
Module 05Why OAuth/OIDC Matters in Modern Security
Module 06Strategic Importance
Module 07OAuth/OIDC in the Enterprise Security Landscape
Module 08Zero Trust Foundation
Module 09Cloud-Native Security
Module 10Regulatory Compliance
Module 11Attack Surface Reduction
Module 12Authorization Framework
Module 13Authentication Layer
Module 14Key Terminology
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice oauth/oidc for beginners: field guide by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for advanced cyber defense mastery
  • Lab 2: Execute hands-on tasks for level: intermediate
  • Lab 3: Execute hands-on tasks for duration: 6 hours
  • Lab 4: Explain Executive Overview fundamentals
  • Lab 5: Execute hands-on tasks for why oauth/oidc matters in modern security
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for OAuth/OIDC for Beginners: Field Guide, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI