How to use this

Practical, not perfection
  1. Pick the tier you are studying and copy the template into your notes.
  2. Complete it for one real example (work, a side project, or a safe fictional scenario).
  3. Use the rubric to tighten it until it is defensible.
  4. Paste a short reflection into your CPD record: what you assumed, what evidence you would keep, and what you would do next.

Foundations. Agent capability scope memo

Template + rubric + example

Template

Rubric (what “good enough” looks like)

  • Scope and boundaries are clear (what is in/out).
  • Tool permissions are explicit and minimal.
  • Escalation triggers are clear and testable.
  • Evidence is identified (what you would log/measure/keep).

Worked example (short)

Example (short):
This agent schedules meetings by reading calendars and sending invites.
It must not access email content, delete events, or share availability externally.
Fallback: if no overlapping time is found, summarise conflicts and ask for guidance.

Core concepts. Agent design patterns checklist

Template + rubric + example

Template

Rubric (what “good enough” looks like)

  • Assumptions are explicit and testable.
  • Pattern selection is justified by the task requirements.
  • Memory boundaries prevent context pollution.
  • Evidence is identified (what you would log/measure/keep).

Worked example (short)

Example (short):
Pattern: ReAct with tool-use for structured actions.
Memory: rolling window of last 5 exchanges + vector retrieval for policies.

Practical building. Agent implementation specification

Template + rubric + example

Template

Rubric (what “good enough” looks like)

  • Tool schemas are precise and validated.
  • Side effects are identified and reversible where possible.
  • Evidence is identified (what you would log/measure/keep).
  • Next actions are concrete and realistic.

Worked example (short)

Example (short):
Framework: LangGraph with OpenAI function calling.
Human checkpoint: confirm before sending external communications.

Security and ethics. Agent threat model and guardrails

Template + rubric + example

Template

Rubric (what “good enough” looks like)

  • Prompt injection mitigations are explicit.
  • High-impact actions require human approval.
  • Evidence is identified (what you would log/measure/keep).
  • Next actions are concrete and realistic.

Worked example (short)

Example (short):
Threat: prompt injection via user-supplied context.
Mitigation: separate system and user instructions, use structured outputs, log all tool calls.

Advanced. Multi-agent orchestration design

Template + rubric + example

Template

Rubric (what “good enough” looks like)

  • Agent roles are distinct and non-overlapping.
  • Coordination pattern matches the problem structure.
  • Evidence is identified (what you would log/measure/keep).
  • Next actions are concrete and realistic.

Worked example (short)

Example (short):
Pattern: hierarchical with planner agent delegating to specialist agents.
Failure handling: if specialist fails twice, escalate to human supervisor.

Capstone. Production agent deployment checklist

Template + rubric + example

Template

Rubric (what “good enough” looks like)

  • All checklist items are addressed or explicitly deferred.
  • Known limitations are documented publicly.
  • Evidence is identified (what you would log/measure/keep).
  • Next actions are concrete and realistic.

Worked example (short)

Example (short):
Limitation: agent cannot access external websites; all data must be provided.
Rollback: feature flag to disable agent and route to manual workflow.