RCCE Course
Course #513

Zero-Trust Approach to Attack surface

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: Foundations
📋 Prerequisites: None
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn core security principles, the CIA triad, defense-in-depth strategies, risk management fundamentals, and security architecture basics. RCCE students will learn to build a solid cybersecurity knowledge base that supports every domain of the RCCE certification, apply security principles to real-world system design, and develop the analytical thinking needed to evaluate and improve security postures across any organization. This zero-trust course applies modern security principles including least privilege, continuous verification, and explicit trust evaluation. Building on core knowledge, RCCE students will learn to implement zero-trust architectures that assume breach and verify every access request regardless of network location. Students build practical zero-trust implementations that align with organizational security modernization goals.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Zero-Trust Approach to Attack surface
🧠 What You Will Learn
  • Apply zero-trust principles to privilege decisions and elevation
  • Execute hands-on tasks for knowledge goals — covering Master zero-trust architecture principles.
  • Execute hands-on tasks for skill outcomes — covering Build zero-trust policy engines.
  • Execute hands-on tasks for certification alignment — covering Supports RCCE Foundations domain.
  • Explain Topic Map Overview fundamentals
  • Design a scalable privilege management architecture with policy and enforcement
  • Integrate privilege controls with identity providers and SIEM telemetry
  • Execute hands-on tasks for core philosophy — covering Never trust, always verify, No implicit trust from network location, All resources accessed securely regardless of location.
  • Execute hands-on tasks for key shift from perimeter — covering No implicit trust from network location.
  • Apply zero-trust principles to privilege decisions and elevation, including All resources accessed securely regardless of location, Access granted on per-session basis, and Policy driven by dynamic behavioral attributes.
  • Design a scalable privilege management architecture with policy and enforcement, including Castle-and-moat model.
📚 Course Outline
Module 01Zero-Trust Approach to Attack Surface
Module 02Knowledge Goals
Module 03Skill Outcomes
Module 04Certification Alignment
Module 05Topic Map Overview
Module 063. ZT Architecture
Module 074. Identity & Access
Module 08What Is Zero Trust?
Module 09Core Philosophy
Module 10Key Shift from Perimeter
Module 11Zero-Trust Principles (Forrester / NIST SP 800-207)
Module 12Evolution of Trust Models
Module 13Zero Trust (2015–Present)
Module 14CIA Triad in Zero-Trust Context
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice zero-trust approach to attack surface by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Apply zero-trust principles to privilege decisions and elevation
  • Lab 2: Execute hands-on tasks for knowledge goals
  • Lab 3: Execute hands-on tasks for skill outcomes
  • Lab 4: Execute hands-on tasks for certification alignment
  • Lab 5: Explain Topic Map Overview fundamentals
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Zero-Trust Approach to Attack surface, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI