Segmentation Threats and Detection: Bootcamp Module
RCCE students will learn network segmentation design and implementation including VLAN segmentation, micro-segmentation, zero trust network architecture, and segmentation testing. RCCE students will learn to design network segmentation architectures that limit lateral movement, implement VLANs, firewall zones, and software-defined segmentation, apply micro-segmentation to protect high-value assets, verify segmentation effectiveness through penetration testing, monitor inter-segment traffic for policy violations, troubleshoot segmentation-related connectivity issues, and maintain segmentation policies as organizational network architectures evolve across on-premises, cloud, and hybrid environments. This threat-focused course teaches students to think like adversaries while building robust defenses. At an expert level, RCCE students will learn to analyze attack techniques, build detection logic, and implement defensive strategies that proactively identify threats before they cause damage. Students develop a threat-informed mindset that drives better security decisions across all operational activities.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Segmentation Threats and Detection: Bootcamp Module
- Execute hands-on tasks for segmentation threats
- Execute hands-on tasks for learning objectives
- Execute hands-on tasks for network segmentation fundamentals
- Execute hands-on tasks for what is segmentation?
- Execute hands-on tasks for why segment? — covering Dividing a network into isolated zones, Contain breaches to limited zones.
- Design a scalable privilege management architecture with policy and enforcement
- Execute hands-on tasks for flat network
- Design a scalable privilege management architecture with policy and enforcement, including 802.1Q tagging on trunk ports.
- Execute hands-on tasks for vlan core concepts — covering 802.1Q tagging on trunk ports.
- Design a scalable privilege management architecture with policy and enforcement, including Dedicated management VLAN.
- Execute hands-on tasks for vlan security hardening checklist — covering Change default native VLAN from VLAN 1.
- Execute hands-on tasks for 802.1q frame structure
| Module 01 | Segmentation Threats |
| Module 02 | Learning Objectives |
| Module 03 | Network Segmentation Fundamentals |
| Module 04 | What Is Segmentation? |
| Module 05 | Why Segment? |
| Module 06 | Segmentation Architecture Models |
| Module 07 | Flat Network |
| Module 08 | VLAN Architecture and Design |
| Module 09 | VLAN Core Concepts |
| Module 10 | Design Best Practices |
| Module 11 | VLAN Security Hardening Checklist |
| Module 12 | 802.1Q Frame Structure |
| Module 13 | Common Trunk Risks |
| Module 14 | Untrusted Zone |
All hands-on labs run on Rocheston Rose X OS. Students practice segmentation threats and detection: bootcamp module by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Execute hands-on tasks for segmentation threats
- Lab 2: Execute hands-on tasks for learning objectives
- Lab 3: Execute hands-on tasks for network segmentation fundamentals
- Lab 4: Execute hands-on tasks for what is segmentation?
- Lab 5: Execute hands-on tasks for why segment?
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Segmentation Threats and Detection: Bootcamp Module, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI