RCCE Course
Course #357

Segmentation Incident Response

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: Network Security
📋 Prerequisites: Foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn network segmentation design and implementation including VLAN segmentation, micro-segmentation, zero trust network architecture, and segmentation testing. RCCE students will learn to design network segmentation architectures that limit lateral movement, implement VLANs, firewall zones, and software-defined segmentation, apply micro-segmentation to protect high-value assets, verify segmentation effectiveness through penetration testing, monitor inter-segment traffic for policy violations, troubleshoot segmentation-related connectivity issues, and maintain segmentation policies as organizational network architectures evolve across on-premises, cloud, and hybrid environments. This incident response course prepares students to act decisively during security incidents with structured workflows and clear decision frameworks. Building on core knowledge, RCCE students will learn containment, evidence collection, eradication, and recovery procedures specific to this domain. Students practice incident scenarios that build the composure, coordination, and documentation skills essential for effective incident handling.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Segmentation Incident Response
🧠 What You Will Learn
  • Build detections and response workflows for privilege escalation
  • Execute hands-on tasks for module objectives
  • Execute hands-on tasks for what is network segmentation?
  • Execute hands-on tasks for why it matters — covering Dividing a network into isolated zones, Prevents lateral movement by attackers.
  • Explain Segmentation Models Overview fundamentals
  • Execute hands-on tasks for firewall zones — covering Layer 3/4 policy enforcement.
  • Apply zero-trust principles to privilege decisions and elevation, including Verify every flow, no implicit.
  • Design a scalable privilege management architecture with policy and enforcement, including 802.1Q tagging on trunk ports.
  • Execute hands-on tasks for management vlan isolated from data vlans
  • Execute hands-on tasks for private vlans — covering Shut down and assign to unused VLAN, Isolate hosts within same VLAN.
  • Execute hands-on tasks for shut down and assign to unused vlan — covering Isolate hosts within same VLAN.
📚 Course Outline
Module 01Segmentation Incident Response
Module 02Module Objectives
Module 03What Is Network Segmentation?
Module 04Why It Matters
Module 05Segmentation Models Overview
Module 06Firewall Zones
Module 07Zero Trust
Module 08VLAN Architecture Fundamentals
Module 09VLAN Design Principles
Module 10Management VLAN isolated from data VLANs
Module 11Private VLANs
Module 12Shut down and assign to unused VLAN
Module 13Dynamic ARP Inspection
Module 14Prevent rogue DHCP servers
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice segmentation incident response by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Build detections and response workflows for privilege escalation
  • Lab 2: Execute hands-on tasks for module objectives
  • Lab 3: Execute hands-on tasks for what is network segmentation?
  • Lab 4: Execute hands-on tasks for why it matters
  • Lab 5: Explain Segmentation Models Overview fundamentals
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Segmentation Incident Response, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI