• Online, Instructor-Led
  • Classroom
Course Description

The Rocheston Certified Cybersecurity Engineer (RCCE) course is an intensive hands-on program designed to equip aspiring cybersecurity professionals with the skills and knowledge required to defend against a wide range of cyber threats. A key component of the RCCE course is the hands-on labs, which provide students with practical experience in using cutting-edge cybersecurity tools and techniques. These labs are powered by Rocheston's proprietary Linux-based operating system, Rocheston Rose Cybersecurity OS. This specialized OS has been developed for use in the RCCE course and contains an extensive collection of hacking and ?cybersecurity tools, amounting to nearly 2 TB of resources. The hands-on labs in the RCCE course are hosted on the cloud, which means students can access and complete them using a web browser. There is no need to install any additional software or hardware, making it incredibly convenient and easy for students to practice their skills from anywhere, at any time. The labs cover a wide range of topics and techniques, from penetration testing and vulnerability assessment to network security and digital forensics. Students will work through real-world scenarios and challenges designed to test their knowledge and? Hone their skills in a safe, controlled environment. Penetration Testing: Students will learn how to identify and exploit vulnerabilities in a target system, using a range of tools and techniques to gain? Unauthorized access and maintain control. Vulnerability Assessment: Students will practice identifying and assessing potential security vulnerabilities in a system, using various scanning tools and? Methodologies to evaluate the risk and recommend appropriate? Remediation measures. Network Security: Students will gain hands-on experience in securing networks from various threats, including configuring firewalls, intrusion detection? Systems, and VPNs, as well as monitoring network traffic for signs? Of malicious activity. Incident Response: Students will learn how to conduct digital forensic investigations, including the collection and analysis of digital evidence and the proper handling and preservation of evidence to maintain its integrity.

Learning Objectives

1. Develop a comprehensive understanding of cybersecurity threats, attacks, and defenses 2. Master reconnaissance techniques, including machine learning and artificial intelligence applications in cybersecurity 3. Identify and analyze cyber vulnerabilities 4. Understand and perform web application attacks 5. Learn about web shells, spyware, and backdoors 6. Comprehend and mitigate denial of service attacks 7. Master log management and network analysis techniques 8. Understand identity and access management principles 9. Learn wireless hacking techniques 10. Gain knowledge about firewalls and intrusion detection systems 11. Master the use of hacking frameworks like Metasploit 12. Understand cryptography principles and applications 13. Develop skills in malware analysis 14. Learn about cybersecurity certification for IoT devices

Framework Connections

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.