RCCE Course
Course #749

Practical Telemetry strategy Workshop

📊 Level: Beginner
⏱️ Duration: 2 Days
🏷️ Track: SOC
📋 Prerequisites: None
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn security telemetry collection strategy including data source identification, collection architecture, telemetry pipeline design, and coverage assessment. RCCE students will learn to identify critical telemetry sources across endpoints, networks, cloud environments, and applications, design telemetry collection architectures that balance coverage with performance and cost, implement telemetry pipelines for data enrichment, normalization, and routing, assess telemetry coverage against detection requirements and MITRE ATT&CK, manage telemetry volume and storage costs, troubleshoot telemetry collection failures, and continuously optimize telemetry strategy as the organizational attack surface evolves. This practice-intensive course emphasizes applied skills through lab exercises, real-world scenarios, and production-realistic workflows. Starting from foundational concepts, RCCE students will learn by doing, building muscle memory and practical confidence through repeated hands-on engagement. Students complete exercises that mirror actual workplace tasks, ensuring skills transfer directly to their professional roles.

🎯 Target Audience
  • SOC Analysts and Incident Responders
  • Detection Engineers and SIEM Content Authors
  • Threat Hunters improving adversary coverage
  • Security Operations Team Leads
  • Professionals implementing Practical Telemetry strategy Workshop
🧠 What You Will Learn
  • Monitor and audit privilege usage; detect escalation attempts
  • Monitor and audit privilege usage; detect escalation attempts, including endpoint, network, cloud sources.
  • Design a scalable privilege management architecture with policy and enforcement, including Balance coverage, performance, cost.
  • Execute hands-on tasks for pipeline engineering — covering Enrichment and normalization.
  • Execute hands-on tasks for coverage assessment — covering MITRE ATT&CK mapping, Gap analysis techniques, Continuous optimization.
  • Execute hands-on tasks for mitre att&ck mapping — covering Gap analysis techniques, Continuous optimization.
  • Execute hands-on tasks for key insight — covering Telemetry is the superset.
📚 Course Outline
Module 01Practical Telemetry Strategy Workshop
Module 02Building Detection-Ready Telemetry Pipelines for the Modern SOC
Module 03Telemetry Source Identification
Module 04Collection Architecture Design
Module 05Pipeline Engineering
Module 06Coverage Assessment
Module 07MITRE ATT&CK mapping
Module 08What Is Security Telemetry?
Module 09Telemetry vs Logging vs Monitoring
Module 10Key Insight
Module 11Telemetry Data Source Categories
Module 12Endpoint Telemetry Deep Dive
Module 13▶ Process Events
Module 14📁 File System Events
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice practical telemetry strategy workshop by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Monitor and audit privilege usage; detect escalation attempts
  • Lab 2: Monitor and audit privilege usage; detect escalation attempts
  • Lab 3: Monitor and audit privilege usage; detect escalation attempts
  • Lab 4: Design a scalable privilege management architecture with policy and enforcement
  • Lab 5: Execute hands-on tasks for pipeline engineering
📊 Skill Level
Beginner
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Practical Telemetry strategy Workshop, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI