How to use this
Practical, not perfection- Pick the tier you are studying and copy the template into your notes.
- Complete it for one real example (work, a side project, or a safe fictional scenario).
- Use the rubric to tighten it until it is defensible.
- Paste a short reflection into your CPD record: what you assumed, what evidence you would keep, and what you would do next.
Foundations. Encapsulation storyboard
Template + rubric + exampleRubric (what "good enough" looks like)
- Layering is correct and uses concrete protocol terms.
- Evidence is identified (what you would log/measure/keep).
Worked example (short)
Example (short):
Flow: HTTPS request.
Evidence: curl -v, DNS output, tcpdump filter (safe environment).
Applied. Troubleshooting worksheet
Template + rubric + exampleRubric (what "good enough" looks like)
- Hypotheses are ordered and evidence-based.
- Next actions are concrete and realistic.
- Evidence is identified (what you would log/measure/keep).
Worked example (short)
Example (short):
Symptom: site loads slowly.
Evidence: DNS timing, TLS handshake time, RTT.
Practice. Security by layer map
Template + rubric + exampleRubric (what "good enough" looks like)
- Controls are placed where they actually work.
- Trade-offs are stated, not implied.
- Evidence is identified (what you would log/measure/keep).
Worked example (short)
Example (short):
L7: authz checks; L4: rate limits; L3: segmentation.