RCCE Course
Course #568

Zero-Trust Approach to Serverless security

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: Cloud Security
📋 Prerequisites: Cloud foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn cloud architecture security, identity management in cloud environments, cloud-native controls, misconfiguration prevention, and multi-cloud governance. RCCE students will learn to secure workloads across AWS, Azure, and GCP, apply cloud-native guardrails, detect and remediate cloud misconfigurations, and maintain comprehensive visibility and control in modern cloud environments. This zero-trust course applies modern security principles including least privilege, continuous verification, and explicit trust evaluation. Building on core knowledge, RCCE students will learn to implement zero-trust architectures that assume breach and verify every access request regardless of network location. Students build practical zero-trust implementations that align with organizational security modernization goals.

🎯 Target Audience
  • Cloud Security Architects and Engineers
  • DevSecOps and Platform Engineers
  • Identity and Access Management Specialists
  • Security Analysts securing cloud workloads
  • Professionals implementing Zero-Trust Approach to Serverless security
🧠 What You Will Learn
  • Apply zero-trust principles to privilege decisions and elevation
  • Execute hands-on tasks for serverless security
  • Explain Course Overview fundamentals
  • Execute hands-on tasks for learning scope
  • Execute hands-on tasks for practical outcomes — covering least-privilege function policies.
  • Execute hands-on tasks for familiarity with ci/cd pipelines
  • Design a scalable privilege management architecture with policy and enforcement
  • Execute hands-on tasks for event source
  • Execute hands-on tasks for key characteristics
  • Execute hands-on tasks for security implications — covering No server provisioning required, Expanded attack surface per function.
  • Execute hands-on tasks for key takeaway — covering Serverless shifts security focus from infrastructure to code, config, and identity.
📚 Course Outline
Module 01Zero-Trust Approach to
Module 02Serverless Security
Module 03Course Overview
Module 04Learning Scope
Module 05Practical Outcomes
Module 06Familiarity with CI/CD pipelines
Module 07Serverless Architecture Fundamentals
Module 08Event Source
Module 09Key Characteristics
Module 10Security Implications
Module 11Key Takeaway
Module 12Zero-Trust Principles for Serverless
Module 13Least Privilege
Module 14Continuous Verify
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice zero-trust approach to serverless security by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Apply zero-trust principles to privilege decisions and elevation
  • Lab 2: Execute hands-on tasks for serverless security
  • Lab 3: Explain Course Overview fundamentals
  • Lab 4: Execute hands-on tasks for learning scope
  • Lab 5: Execute hands-on tasks for practical outcomes
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Zero-Trust Approach to Serverless security, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI