Maintenance
Backup Verification Drills
Turn “we have backups” into provable restores with checksums, scopes, and honest time estimates.
Programs catalog
Each listing shows honest duration text and KRW tuition bands. Enrollment still flows through humans so we can match rack time to your team’s quiet hours.
13 programs match
Maintenance
Turn “we have backups” into provable restores with checksums, scopes, and honest time estimates.
Networking
Draw zones that match reality, test rules safely, and peek into namespaces without losing your place.
Monitoring
Run bridges without talking over each other, time-box investigations, and hand off cleanly at shift end.
Maintenance
Tune retention, ship logs safely, and stop disks from filling because nobody owns the logging budget.
Linux Admin
Rebuild confidence restarting units, reading unit files, and tracing failed dependencies on Enterprise Linux hosts.
Networking
Design upstream blocks that fail visibly, tune probes honestly, and document behavior under partial outages.
Linux Admin
Hold versions without freezing security, and document exceptions when vendors insist on bleeding edges.
Linux Admin
Quiet noisy queues, trace deferred reasons, and communicate impact without promising magic delivery fixes.
Monitoring
Instrument noisy hosts without melting CPUs, label metrics honestly, and keep dashboards readable.
Maintenance
Read mdadm noise, interpret SMART triage, and know when to stop poking and escalate hardware.
Security Basics
Rotate keys without locking yourself out, layer bastion patterns, and document access for audits.
Linux Admin
Replace mystery cron lines with timers you can explain, monitor, and silence when they misbehave.
Security Basics
Layer POSIX ACLs without hiding ownership problems, and document decisions future-you will understand.
Small preference files keep forms and theme stable. Details live in our Cookie Preferences document.