Networking and Security
Networking and Security — Zero Trust Workshop
Workshop format favors quick sketches and crisp bullets. You leave with a reusable pattern library for prompts that mention contractors, partners, or split trust zones.
2 weeks · Live workshop
189,000 KRW informational
Inclusions
- Six ninety-minute live workshops
- Sketch prompts with timer
- Annotated exemplars for two past cohorts
- Breakout rooms capped at five participants
- Office hour recordings for async learners
- Checklist for incident records handoffs
- Cross-reference to Networking and Security — Private Service Paths labs
Outcomes you can cite
- Draft a zero trust outline referencing two concrete controls.
- Name a logging gap from a short narrative.
- Explain vendor-neutral posture assumptions in one paragraph.
Lead instructor
Jonas Meyer
Leads architecture scenario grading rubrics.
Participant notes
Breakout sketch on contractor access forced me to name assumptions I usually hand-wave.
— Helena , Security analyst · 5/5
Policy questions
Yes, posted within forty-eight hours; attendance live is encouraged for breakout credit.
High-level signals only—no mobile device management vendor training.
We do not supply legal templates for external reviewers; only operational patterns.