First just curious about your question and further clarification of it.
I guess it would help to know if these are for you ( what is you role) or for a customer ( contact us and we can set up a call) but that information would help.
All of the labs are important of course. It sounds like it is a course you are taking.
I am not sure about the two hour limit you are speaking of. Is it an on demand course or what is the format and is this target time flexible?
Just to get another perspective, I am also looping in the lead curriculum developer to get her insight into this as well. She may have additional information. Lisa please feel free to follow-up this request /question and add or subtract ideas.
Assuming the questions can be clarified above, let me say It will certainly depend on the skill level you have and what your priorities are for learning in the foundations course.
I think some of the best include taking a use case through the course and performing various labs working with it. It presents a comprehensive view and sets of activities that are contained in the course in a practical effective manner for a student. That is the most comprehensive that touch several learned skill in the class.
These series of I speak of, trace through different parts of DDNS use case taught in the course from the time you discover it to the time you download feeds , create a custom feed and create application rules to facilitate meaningful alerts. Those are 4-5 labs. labs
Then the reporting and alerting labs ( how to report on this use case). The DDNS use case and the 6-7 ;abs total including all those tasks is the strongest part of the course in terms of practical lab applications.
Please reach out to me and/or Lisa if to get further direction or help.
Dace McPherson CISSP, CTIA, CEI | SeniorTechnical Education Consultant
<https://www.rsa.com/en-us>, a Dell Technologies Company | RSA University Website<https://community.rsa.com/community/training>
CONFIDENTIALITY NOTICE: The information contained in this email message and any files transmitted with it are confidential. It is intended only for the addressee and others authorized to receive it. If you are not the intended recipient or the person responsible for delivering the message to the intended recipient, you ae advised that you have received the email in error. Please delete it and advise the sender immediately. You should not retain the message or disclose the contents to anyone. Any disclosure, copying. Distribution or action taken in reliance on the contents of the email and its attachments is strictly prohibited.