A hands-on program that treats security as an operating model. Participants design response teams and playbooks, harden identities and infrastructure, engineer monitoring and threat hunting, run controlled recovery after intrusions, and institutionalize lessons learned. Scenarios include active intrusion, ransomware, data exfiltration, and business email compromise—emphasizing who does what, when, and with which evidence.