Hands-on Labs
Operational Activity Log Design Workshop
Maps enterprise activity log patterns to SQL Server audit features without vendor hype.
119,000 KRW 1 week intensive Hybrid
Pricing is informational; paying tuition happens through the enrollment email you receive after contacting us. See the Cancellation Policy for eligibility windows.
Program narrative
You compare temporal tables, audit, and change data capture using the same fictional acquisition story so comparisons stay grounded.
Included rehearsals
- Decision matrix for audit vs CDC vs temporal
- Storage projection worksheets
- Retention policy drafting with legal-adjacent language avoided
- Sample queries for reconstructing timelines
- Threat modeling tabletop for insider scenarios
- Peer review of anonymized activity log excerpts
- Export pack for architecture review boards
Outcomes you can evidence
- Recommend a logging stack with explicit retention owners
- Reconstruct a timeline for a staged incident packet
- Identify one gap where application telemetry must partner with SQL audit
Lead mentor
Sora Ahn
Assessment specialist interested in evidence design, not buzzwords.
FAQ
Legal advice?
We provide operational patterns only; counsel review is your responsibility for regulated contexts.
Third-party SIEM?
Mentioned conceptually; connector configuration is out of scope.
Cloud native audit?
Comparisons stay at a planning level; cloud IAM is not taught line-by-line.
Experience notes
Client in enterprise markets: the matrix cut our architecture meeting time in half even though we disagreed on one row.