RCCE Course
Course #320

Recon Architecture Patterns

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: Offensive Security
📋 Prerequisites: Foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn reconnaissance methodologies including passive and active reconnaissance, OSINT gathering, network scanning, service enumeration, and target profiling for security assessments. RCCE students will learn to conduct passive reconnaissance using public data sources, DNS records, certificate transparency logs, and social media, perform active reconnaissance including port scanning, service fingerprinting, and web application enumeration, use tools including Nmap, Shodan, Censys, and custom scripts, map organizational attack surfaces, identify potential entry points and high-value targets, maintain operational security during reconnaissance, and document reconnaissance findings for penetration test planning. This architecture course teaches secure system design using proven patterns, guardrails, and reference architectures. Building on core knowledge, RCCE students will learn to evaluate design options against security requirements, make informed trade-off decisions, and build systems that are resilient by design. Students gain the architectural thinking skills needed for security engineering and solution design roles.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Recon Architecture Patterns
🧠 What You Will Learn
  • Design a scalable privilege management architecture with policy and enforcement
  • Explain Module Overview fundamentals
  • Execute hands-on tasks for what you will learn
  • Execute hands-on tasks for why it matters — covering Recon is the foundation of every assessment.
  • Execute hands-on tasks for maintain opsec throughout reconnaissance phases
  • Execute hands-on tasks for recon phase objectives — covering Identify target scope and boundaries, T1595: Active Scanning.
  • Execute hands-on tasks for mitre att&ck: reconnaissance — covering Identify target scope and boundaries.
  • Execute hands-on tasks for passive reconnaissance
  • Execute hands-on tasks for active reconnaissance — covering No direct interaction with target, Direct interaction with target.
  • Execute hands-on tasks for people intelligence
  • Execute hands-on tasks for osint fundamentals — covering People Intelligence.
  • Execute hands-on tasks for dns reconnaissance deep dive — covering A/AAAA: Host to IP mapping, Zone transfer attempts (AXFR).
📚 Course Outline
Module 01Recon Architecture Patterns
Module 02Module Overview
Module 03What You Will Learn
Module 04Why It Matters
Module 05Maintain OPSEC throughout reconnaissance phases
Module 06Recon Phase Objectives
Module 07MITRE ATT&CK: Reconnaissance
Module 08Passive Reconnaissance
Module 09Active Reconnaissance
Module 10People Intelligence
Module 11OSINT Fundamentals
Module 12DNS Reconnaissance Deep Dive
Module 13DNS Enumeration Techniques
Module 14CNAME: Alias chains and CDN detection
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice recon architecture patterns by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Design a scalable privilege management architecture with policy and enforcement
  • Lab 2: Explain Module Overview fundamentals
  • Lab 3: Execute hands-on tasks for what you will learn
  • Lab 4: Execute hands-on tasks for why it matters
  • Lab 5: Execute hands-on tasks for maintain opsec throughout reconnaissance phases
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Recon Architecture Patterns, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI