Security Basics
SSH Hardening and Key Lifecycle
Rotate keys without locking yourself out, layer bastion patterns, and document access for audits.
610,000 KRW informational until enrollment confirms
Security Basics
Rotate keys without locking yourself out, layer bastion patterns, and document access for audits.
610,000 KRW informational until enrollment confirms
Labs rotate around a three-hop classroom topology. You practice emergency break-glass keys, break a config on purpose, then recover using only serial console prompts we provide.
Recommended but not mandatory; we provide soft-token simulations.
We provide a classroom VPN profile only; corporate integrations are yours to map.
Client-side device compliance policies are referenced, not configured.
“Break-glass lab felt stressful in a useful way. I now photograph serial labels before touching sshd_config.”
Eun · Junior admin · Retail HQ · Google
“Client in logistics — quote only: "Match blocks finally clicked after the subnet coloring exercise."”
Anonymous
Small preference files keep forms and theme stable. Details live in our Cookie Preferences document.