Zero-Trust Approach to Serverless security
RCCE students will learn cloud architecture security, identity management in cloud environments, cloud-native controls, misconfiguration prevention, and multi-cloud governance. RCCE students will learn to secure workloads across AWS, Azure, and GCP, apply cloud-native guardrails, detect and remediate cloud misconfigurations, and maintain comprehensive visibility and control in modern cloud environments. This zero-trust course applies modern security principles including least privilege, continuous verification, and explicit trust evaluation. Building on core knowledge, RCCE students will learn to implement zero-trust architectures that assume breach and verify every access request regardless of network location. Students build practical zero-trust implementations that align with organizational security modernization goals.
- Cloud Security Architects and Engineers
- DevSecOps and Platform Engineers
- Identity and Access Management Specialists
- Security Analysts securing cloud workloads
- Professionals implementing Zero-Trust Approach to Serverless security
- Apply zero-trust principles to privilege decisions and elevation
- Execute hands-on tasks for serverless security
- Explain Course Overview fundamentals
- Execute hands-on tasks for learning scope
- Execute hands-on tasks for practical outcomes — covering least-privilege function policies.
- Execute hands-on tasks for familiarity with ci/cd pipelines
- Design a scalable privilege management architecture with policy and enforcement
- Execute hands-on tasks for event source
- Execute hands-on tasks for key characteristics
- Execute hands-on tasks for security implications — covering No server provisioning required, Expanded attack surface per function.
- Execute hands-on tasks for key takeaway — covering Serverless shifts security focus from infrastructure to code, config, and identity.
| Module 01 | Zero-Trust Approach to |
| Module 02 | Serverless Security |
| Module 03 | Course Overview |
| Module 04 | Learning Scope |
| Module 05 | Practical Outcomes |
| Module 06 | Familiarity with CI/CD pipelines |
| Module 07 | Serverless Architecture Fundamentals |
| Module 08 | Event Source |
| Module 09 | Key Characteristics |
| Module 10 | Security Implications |
| Module 11 | Key Takeaway |
| Module 12 | Zero-Trust Principles for Serverless |
| Module 13 | Least Privilege |
| Module 14 | Continuous Verify |
All hands-on labs run on Rocheston Rose X OS. Students practice zero-trust approach to serverless security by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Apply zero-trust principles to privilege decisions and elevation
- Lab 2: Execute hands-on tasks for serverless security
- Lab 3: Explain Course Overview fundamentals
- Lab 4: Execute hands-on tasks for learning scope
- Lab 5: Execute hands-on tasks for practical outcomes
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Zero-Trust Approach to Serverless security, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI