The Build: Design and deploy a functional “Governance Proxy” that intercepts a user prompt, scans it against a policy file, redacts sensitive info, and logs the interaction. The Exam: Final technical assessment to validate practitioner-level competence.