Rocheston Certified Cybersecurity Engineer - Level 2

The RCCE Level 2 program will give you a detailed, in-depth knowledge and hands-on labs. You will have mastery over hacking technologies and tools. The Level 2 program covers advanced futuristic hacking stuff. For instance, it looks at advanced blockchain exploits, quantum computing and cryptography, advanced ransomware and cryptojacking, etc. The RCCE Level 1 is a mandatory requirement, to move to the Level 2 program.

Course syllabus:

  1. Sophisticated and Extremely Advanced Phishing Techniques Harvested by Chinese and Russian Hackers

  2. Deep Network Insights for Deeper Analytics

  3. Read Privileged Kernel Memory and Leak Data to Escalate Privileges

  4. Advanced Blockchain Exploits and Cryp to currency Mining Attacks

  5. Sophisticated Government use of Cyber weapon Attacks and How they work

  6. Principles of Quantum Entanglement to Secure Communication (Unhackable networks)

  7. Guidance For Cyber security Disclosure and Advanced Techniques for Cyber Bounty hunting

  8. Advanced Mobile Banking and ATM Trojans

  9. Quantum Computing and Cryptography

  10. Dark Web and How to Download Sophisticated Stealth Tools

  11. Advanced Cloud Security - Azure, AWS, Digital Ocean, Google VM

  12. H2O Driver less AI, Amazon Sage Maker, and Azure Machine Learning AutoML

  13. Deepfakes and Generating Automated Fake news

  14. Advanced Threat Modelling Attacks

  15. Cognitive-Powered Security Intelligence Platform

  16. Advanced Ransomware and Cryp to jacking Attacks

  17. Open Source Intelligence in Cyber security

  18. Attacking AI Chatbot and Voice Assistants - Siri, Google Home and Alexa

  19. Deep Locker: How AI Can Power a Stealthy New Breed of Malware

  20. Cybersecurity Insurance

  21. Advanced File System Protection With Cyber Deception

  22. Legal AI: How Machine Learning Is Aiding, Concerning Law Practitioners

  23. Advanced Threat Hunting Techniques

  24. Vulnerability Management Process Based on Weaponization and Asset Value

  25. Passwordless Authentication With FIDO

  26. Advanced PowerShell Attacks

  27. Next Generation of the Cyber Range Attacks

  28. Advanced Payment Gateway and Financial Cyberattacks

  29. Developing Immersive Cybersecurity Simulation

  30. Advanced DDOS Attacks Using IoT Botnets

  31. Attacking Hidden Endpoint Management Firewalls and IDS

  32. Advanced BGP Router Attacks

  33. Machine Learning with Automated Software Vulnerabilities

  34. Hacking Medical IoT Devices

  35. Hacking Biometric Security, and Facial Recognition Systems

  36. Threat Intelligence Models for Cyber Warfare

  37. Artificial Intelligence and Cyberwarfare

  38. Hacking Connected Cars

  39. Hacking Power Grids

  40. Advanced Mobile Phone Hacking, Spying, GPS and Monitoring

  41. Home Automation and IoT Gadgets

  42. How To Use Tensor flow

  43. Advanced EMP Cyber attacks

  44. Hacking heart devices, pacemakers, insertable cardiac

  45. ntegrating IoT Security into Vulnerability Management Program

  46. Containers & Cloud Native Security