How it works

A six-step flow with honest handoffs

We keep procurement, security, and operations in the same narrative so approvals feel like shared work instead of sequential gatekeeping.

  1. Step 1

    Discovery call

    We map maintenance culture, remote constraints, and which modules already have internal champions.

  2. Step 2

    Syllabus tailoring

    Optional deep cuts replace generic examples with anonymized exports you provide.

  3. Step 3

    Lab provisioning

    Jump boxes, VPN profiles, and break-glass accounts arrive with a printed checklist.

  4. Step 4

    Classroom cadence

    Mornings emphasize narrative; afternoons are hands-on with deliberate failure injection.

  5. Step 5

    Stakeholder summary

    We deliver a concise readout for leaders who need verbs, not command dumps.

  6. Step 6

    Office hours

    Three weeks of scheduled help so tickets do not erase your notes.

Accordion: common scope questions

Do you enter our production network?

Only under a separate statement of work with change controls. Classroom labs stay isolated.

Can app owners sit in?

Yes, especially for Kerberos and certificate modules. We moderate jargon so the room stays respectful.

What is explicitly out of scope?

We do not provide procurement-ready attestations for unrelated quality standards, and we do not operate payment processing inside this static site.