How it works
A six-step flow with honest handoffs
We keep procurement, security, and operations in the same narrative so approvals feel like shared work instead of sequential gatekeeping.
-
Step 1
Discovery call
We map maintenance culture, remote constraints, and which modules already have internal champions.
-
Step 2
Syllabus tailoring
Optional deep cuts replace generic examples with anonymized exports you provide.
-
Step 3
Lab provisioning
Jump boxes, VPN profiles, and break-glass accounts arrive with a printed checklist.
-
Step 4
Classroom cadence
Mornings emphasize narrative; afternoons are hands-on with deliberate failure injection.
-
Step 5
Stakeholder summary
We deliver a concise readout for leaders who need verbs, not command dumps.
-
Step 6
Office hours
Three weeks of scheduled help so tickets do not erase your notes.
Accordion: common scope questions
Do you enter our production network?
Only under a separate statement of work with change controls. Classroom labs stay isolated.
Can app owners sit in?
Yes, especially for Kerberos and certificate modules. We moderate jargon so the room stays respectful.
What is explicitly out of scope?
We do not provide procurement-ready attestations for unrelated quality standards, and we do not operate payment processing inside this static site.