Practical Cloud misconfigurations Workshop: Blueprint
RCCE students will learn cloud and infrastructure misconfiguration detection, prevention, and remediation including CSPM deployment, configuration baseline management, and automated remediation. RCCE students will learn to identify common misconfigurations across cloud platforms including public S3 buckets, overly permissive security groups, unencrypted data stores, and misconfigured identity policies, deploy cloud security posture management tools, establish configuration baselines and detect drift, implement automated remediation for critical misconfigurations, prioritize misconfiguration findings by exploitability and business impact, and build organizational processes that prevent misconfigurations from reaching production. This practice-intensive course emphasizes applied skills through lab exercises, real-world scenarios, and production-realistic workflows. Starting from foundational concepts, RCCE students will learn by doing, building muscle memory and practical confidence through repeated hands-on engagement. Students complete exercises that mirror actual workplace tasks, ensuring skills transfer directly to their professional roles.
- Cloud Security Architects and Engineers
- DevSecOps and Platform Engineers
- Identity and Access Management Specialists
- Security Analysts securing cloud workloads
- Professionals implementing Practical Cloud misconfigurations Workshop: Blueprint
- Execute hands-on tasks for practical cloud misconfigurations
- Execute hands-on tasks for workshop: blueprint
- Build detections and response workflows for privilege escalation, including Remediation & Response.
- Execute hands-on tasks for cloud computing fundamentals — covering Virtual machines, storage,, Managed runtime environments, Fully managed applications.
- Execute hands-on tasks for example: aws ec2, azure vms — covering Managed runtime environments.
- Execute hands-on tasks for example: aws elastic beanstalk — covering Fully managed applications.
- Design a scalable privilege management architecture with policy and enforcement
- Execute hands-on tasks for data classification & encryption
- Integrate privilege controls with identity providers and SIEM telemetry
- Execute hands-on tasks for network & firewall controls
- Execute hands-on tasks for hypervisor & physical security
- Execute hands-on tasks for data center & hardware
| Module 01 | Practical Cloud Misconfigurations |
| Module 02 | Workshop: Blueprint |
| Module 03 | Detection & Prevention |
| Module 04 | Cloud Computing Fundamentals |
| Module 05 | Example: AWS EC2, Azure VMs |
| Module 06 | Example: AWS Elastic Beanstalk |
| Module 07 | Shared Responsibility Model |
| Module 08 | Data Classification & Encryption |
| Module 09 | Identity & Access Management |
| Module 10 | Network & Firewall Controls |
| Module 11 | Hypervisor & Physical Security |
| Module 12 | Data Center & Hardware |
| Module 13 | What Are Cloud Misconfigurations? |
| Module 14 | Misconfiguration Categories Overview |
All hands-on labs run on Rocheston Rose X OS. Students practice practical cloud misconfigurations workshop: blueprint by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Execute hands-on tasks for practical cloud misconfigurations
- Lab 2: Execute hands-on tasks for workshop: blueprint
- Lab 3: Build detections and response workflows for privilege escalation
- Lab 4: Execute hands-on tasks for cloud computing fundamentals
- Lab 5: Execute hands-on tasks for example: aws ec2, azure vms
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Practical Cloud misconfigurations Workshop: Blueprint, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI