From Network Engineer to Cloud Architect — Setting the Stage for ANS‑C01
The journey from traditional network engineering to cloud-native architecture represents more than a change in tools; it marks a transformation of mindset, scope, and scale. For professionals with background in firewalls, routing, and data center design, this next step is both familiar and profoundly new. The AWS Certified Advanced Networking – Specialty exam stands at the intersection of these worlds, evaluating one’s ability to design, implement, and secure complex global networks driven by virtual services, dynamic topologies, and hybrid connectivity.
You at the Helm: Merging Two Domains
Your transition captures this convergence perfectly. With roots in legacy security, firewall operations, and network segmentation, you had built a solid foundation in reliability, performance, and secure connectivity. The shift to cloud-focused DevSecOps made you a guardian of identity, containers, and automated control. But when your team’s network architect departed, you assumed responsibility for another crucial domain: enterprise-level network architecture in the cloud.
Your project required stitching on-premises campuses, 3rd-party links, and advanced AWS network primitives—Transit Gateway, Gateway Load Balancer, Direct Connect Gateway. But what elevated it was doing this efficiently within a Lean DevSecOps framework, using code pipelines and reusable modules. Suddenly you were delivering global network policies with Terraform, managing scale and security in one go.
This real-world responsibility formed the perfect incubator for deeper certification. You already had operational experience, but now needed to fill in design thinking, pattern alignment, and best practices—exactly what is tested in ANS‑C01.
Opening the Book: Using Exam Guidance as Reference, Not Route
Your entry point into certification preparation was pragmatic. You obtained a well-regarded exam guide, written by an experienced network architect, and used it as both a study tool and a living reference. That guide provided a clear enumeration of the domain focus—how AWS networking services integrate, how global connectivity is designed, and where security and performance interlock.
Rather than treat the guide as a checklist, you underlined it, absorbed its diagrams, and interacted with the author for mentorship. You viewed the book less as preparation material and more as an architectural playbook you could reference whenever designing transit patterns, inspecting encrypted traffic, or planning for resilience.
This approach reframed certification from “passing a test” to “building a mental library of architectures.” Each diagram became a pattern—Direct Connect patterns for hybrid environments, cross-account segmentation patterns, perimeter services via Gateway Load Balancers. You internalized these as templates you could deploy with Terraform when needed.
Layering with Hands-On Learning
Guides are essential, but architecture lives in interaction. To solidify your understanding, you complemented reading with structured, provider-neutral labs coded into your CI/CD workflow. You created test environments that mirrored production structures—Transit Gateway with isolated VPCs, third-party load balancers, inspection chains, security group dependencies. You deployed complex WAF policies, mysterious routing tables, and enforced monitoring to track pathing and traffic flows.
As part of your learning, you simulated failure conditions: lost peering, denied Autonomous System Number (ASN)-based routing, and overlapping CIDR ranges. Each scenario pushed your theory into practice. The result: errors became valuable learning moments, not just exam fodder.
You also tested encryption strategies—for example, encrypting traffic across peering or Direct Connect, integrating with firewall endpoints, and ensuring log clarity around metadata. Every test solidified the cause-and-effect relationships behind design decisions.
Practice Makes Patterns
To test your knowledge, you used two layers of practice assessments. The first came directly from your guide—sample tests with detailed explanations. These quizzed your understanding of why one design trumps another, not just which service to pick.
The second layer was built from community-shared simulation scenarios, containing hybrid networks full of opaque variables—legacy on-prem connectors, multiple routes, edge inspection devices, much like your own production environment. You reviewed incorrect options slowly and reflexively by asking, “Why is this wrong in this context?”
Questions that involved traffic mirroring, encrypted link failover, egress inspection, or DNS-based routing forced you to use architectural judgment, not just recall.
The combined effect of studying and practicing built situational awareness. Instead of thinking in “features,” you began to think in “patterns.” You could detect flawed designs before implementing them.
Choosing to Dive Early
Many candidates contemplate long study cycles, but you chose to proceed at a pace. You realized that momentum can outweigh waiting for perfect conditions. With full work and life responsibilities, you decided to schedule your exam while fresh. The outcome? You passed—emerging from the exam center exhausted, but validated, empowered by real operational skill, not gimmicks.
This timeline reinforces a deeply useful lesson: If your experience aligns with these architectures, studying for ANS‑C01 doesn’t require months—it requires disciplined, purposeful focus combined with real-world testing.
What Makes This Certification Both Real and Strategic
ANS‑C01 matters because it doesn’t reward memorization—it rewards architectural competence. It doesn’t ask vendors for scripting output—it asks for pattern-based reasoning. It demands context-sensitive judgment (for example, balancing performance with encryption, scaling with segmentation, automation with control). That enterprise-level nuance is hard to fake—but when you’ve lived it, it tests your instincts, not your flashcards.
It’s also a differentiator. With many professionals focused on developer security or single-VPC clouds, this exam signals boundary mastery: the ability to design repeatable, secure, scalable networks that span accounts, services, regions, and trust boundaries.
Preparing the Architect’s Mindset
To succeed, candidates must think like architects:
- Context is king. Every design must be weighed against the organization’s scale, risk appetite, existing patterns, and compliance demands.
- Trade-offs are inevitable. Performance, cost, complexity, and resilience must be balanced; there is never a free lunch in network design.
- Failure is the best teacher. Lab your environment, break it intentionally, and rebuild stronger.
This mindset stands in stark contrast to many certification paths focused on covering every feature. Here, the exam tests applying fewer features with more intelligence under real-world conditions.
Deepening Domain Expertise—Inter‑Region Design, Hybrid Connectivity, and Edge Security
Building on your foundation in network engineering and DevSecOps, this second part delves into the knowledge areas that form the spine of the specialist-level networking exam.
Region-to-Region Architecture: Balancing Performance and Consistency
Modern enterprises often span multiple geographic areas, which brings both opportunity and complexity. The exam tests your ability to design networks that seamlessly connect regions with low latency, high availability, and secure routing.
When architecting region-to-region networks, you must analyze trade-offs between direct peering, transit services, or public link patterns. Each choice impacts cost, latency, routing scale, and security posture. You should understand whether to use gateway-level peering with internal services or leverage managed gateways to control plating size and traffic paths.
Moreover, routing must be planned thoughtfully. You need to decide when to rely on centralized edge control or distributed routing tables. Preparation demands that you draw mental network diagrams—overlaying routes, virtual routers, and inspection points—just like you did when designing on-prem campus networks, but adapted to global, automated clouds.
Hybrid Connectivity: On-Premises Meets the Cloud
Exam preparation strongly focuses on hybrid patterns—connecting on-premises data centers to cloud environments. There are multiple hybrid designs possible: site-to-site encrypted links, dedicated cross-connects, global high-performance links with private routing, and transit gateways for consolidating connectivity. Your job is to weigh latency, throughput, encryption, resilience, and failover.
You must also consider Dynamic Routing, BGP, ASNs, and autonomous gateway fallbacks. Hybrid networks can introduce routing loops, overlap, and path asymmetry if not planned correctly. In study, simulate overlapping network addresses, withdrawal scenarios, and fallback mechanisms.
Another exam domain relates to third-party links. You may be expected to describe how to integrate partner routers, chain inspection engines, or BGP policies that separate customer-managed traffic from internal data flows.
Inspecting Traffic at the Cloud Edge
Security-driven inspection at the edge is a recurring theme. The exam expects candidates to understand where to place security components—for example, virtual load balancers, packet inspection appliances, intrusion detection systems, and proxies.
You will need to think like an architect who balances end-to-end encryption with visibility, and who decides when to decrypt, inspect, and re-encrypt traffic. You should be able to diagram inspection flows: from user forensics to threat detection—all while maintaining session integrity and avoiding certificate trust issues.
Your studies should include packet flows with custom appliances chained in transit, transparent proxies, and scalable defences against volumetric floods or zero-day threats. The exam can ask you to justify placement of inspection appliances, determine whether to use in-line horizontal scaling, or select between-managed or self-deployed solutions.
Mastering Transit Gateway and Multi-VPC Routing
Transit Gateway architectures form a large chunk of the networking domain. You should be able to articulate the concepts of route tables, attachment types, propagation, and prioritization. Can you isolate environments via route segmentation? Can you control failover behavior across centralized interconnects? These are critical competencies.
You also need to design how appliances (like inspection modules) are inserted between resources. Are routes re-exported dynamically? What happens when transit links fail, and how does path preference realign? Being familiar with route tables and attachment isolation is essential.
This domain also expects knowledge of interacting with edge constructs—like shared hubs, VPC endpoint behavior, and multi-account routing. Your studies should include patterns for multi-tenant isolation, managing overlapping CIDRs, and controlling transitions between accounts with centralized controls.
Detailed Troubleshooting Patterns
This exam often includes knowledge checks disguised as troubleshooting scenarios. You might be given a failing cross-region link, asymmetric routing paths, or services failing to connect due to route table changes.
Your preparation should involve deliberately breaking transit routes in labs—deleting prefixes, reversing route priorities, disabling peering, and analyzing the system’s response. Equally important is explaining what monitoring data/services show (flow logs, gateway metrics, logs from inspection modules, error codes). Your ability to trace failure across distributed system components, and to propose mitigative steps, will be tested.
DNS Architectures and Cross-Region Services
Advanced networking includes DNS patterns, such as resolving service endpoints across regions or utilizing split-horizon zones. DNS services can be deployed in virtual networks for private resolution or integrated with global DNS for public traffic.
When preparing, consider naming strategies, split-zone replication, inbound and outbound record controls, and DNS-based traffic steering. Understand when to use private zones versus public DNS, and when to integrate with global resolution patterns to ensure endpoint reachability under all conditions.
Encryption Models and Certificate Management
Security-aware networking requires encryption at the link level and application level. You should know how to implement TLS encryption between sites, manage certificates for inspection modules, and rotate credentials. Exam questions may ask you to design certificate rollovers, failover certificate sourcing, or mitigating expired certs without downtime.
Edge Gateway Load Balancing Architectures
Load balancing at edge points ensures connection distribution and failover. You should prepare by designing solutions with geo-routing, circuit isolation, and private connection optimizations. Consider certificate reuse, session persistence across zones, and regional routing resiliency.
Multi-Tenant and Policy-Based Isolation
An advanced domain test involves isolating environments while allowing shared services. This may require designing multi-tenant networks with shared transits but isolated zoning. You should know how to implement shared services availability while preserving security boundaries—using route tags, policies, tags on subnets, and isolation of route table propagation within transit services.
Logging, Visibility, and Security Observability
Cloud network visibility is managed via flow logs, gateway logs, firewall logs, and inspection events. You must understand how to layer these logs for forensic capability—able to trace a packet from origin to inspection to destination. Study logging formats, pipeline behaviors, sample log entries, and high-value triggers like port scans, injection attempts, or encrypted brute force.
You also need to integrate logs with centralized monitoring, knowing how log streams feed into event collectors and trigger alerting workflows. Exam prep should include simulated tampering scenarios or isolated outages, requiring you to debug and trace events with logs from each system component.
Scaling and Automation at the Edge
A recurring exam theme is balancing automation with scale. The certificate tests your ability to use infrastructure as code to deploy transit, inspection, and connectivity patterns repeatably. It also evaluates your ability to inject policies through policy engines, versioning, and modular deployments. You should practice deploying multi-account modular transit stacks dynamically, understanding how to control route propagation and deployment patterns.
Architecture Optimization Patterns
Finally, the exam looks for optimization skills—restructuring architectures to reduce latency, costs, or redundant hops while preserving resiliency. You should be able to recognize when transit gateways are overused, when orphaned routes persist, when DNS patterns add failure points, and when route drift occurs.
By studying these domain patterns and building structured labs that simulate hybrid multi-region environments, you prepare not just for the exam, but for real-world architecture roles. Scenario-based understanding, troubleshooting cycles, and engineering judgment become your most powerful tools.
Operational Excellence and Strategic Governance in Cloud Networking for ANS‑C01
In preparing for the AWS Certified Advanced Networking – Specialty (ANS‑C01) exam, mastering individual services is only part of the journey. The real challenge lies in applying those services with architectural maturity, operational rigor, and strategic governance. This third installment explores how to build reliable, secure, and maintainable network systems in production, while preserving flexibility, driving scale, and optimizing performance. We’ll look at deployment patterns, resilience strategies, governance models, automation pipelines, and incident response frameworks—each aligned with exam expectations and real-world excellence.
Chapter 1: Designing for Resilience and Reliability
Cloud networking must endure disturbances—be it traffic surges, infrastructure failures, or security incidents. The exam tests your ability to architect resilience into every layer.
Active-Active Designs
When high availability is critical, active-active architectures across regions or zones are fundamental. Designing such systems involves using multiple endpoints and load balancing mechanisms that fail over gracefully. You must understand how to propagate routes, manage latency, and monitor health checks. The more complex the environment—e.g., multi-region microservices—the more you need to map the end-to-end flow, ensuring resilience without risking split-brain or route flapping.
Failover Mechanisms
Whether driving failover via BGP on Direct Connect, relying on Transit Gateway route preferences, or using multi-vendor WAN solutions, the exam expects you to balance control with automation. You should be able to choose between active/passive DNS records, BGP path weighting, or circuit redundancy. Understanding how these mechanisms differ in response time, consistency, and automation readiness is critical.
Infrastructure Monitoring and Observability
It’s essential to build visibility into network health. This involves enabling flow logs at VPC, load balancer, and transit layers; analyzing metrics like latency, packet loss, and gateway health; and setting up metrics-driven alerting. For exam preparation, review real-world logs, identify anomalous patterns, and map them back to incident root causes, validating your response strategy.
Chapter 2: Automation and Infrastructure-as-Code for Repeatability
One core requirement of ANS‑C01 is demonstrating how network infrastructure can be built, maintained, and audited via code.
CI/CD Pipelines for Network Config
Using declarative templates or infrastructure-as-code frameworks, you should know how to create version-controlled repositories, implement multi-phase validation, and trigger automated deployments when changes are merged. The exam wants you to think in terms of change management—testing, reviewing, and deploying network components as part of a pipeline, not manually through consoles.
Policy as Code
Security and compliance can be managed proactively. Familiarize yourself with tools that allow testing against policy guardrails. For instance, you might write tests that check for encryption presence, prohibit wildcard routes, or enforce inspection tiers before deployment proceeds. Understanding how to incorporate policy testing into pipelines—through static analysis or inline checks—is essential for both cloud operations and exam success.
Operational Templates and Reusability
Designing reusable modules—Transit Gateway hub-n-spoke, DNS resolvers, firewall insertion chains—is more than saving time; it’s about consistency and control. If exams ask for a multi-account deployment pattern, you should think in terms of shared modules applied across environments with minimal divergence. Preparing for ANS‑C01 requires being able to describe how templates scale with variable input and controlled differences.
Chapter 3: Governance, Compliance, and Cost Control
Network reliability is a core concern, but long-term architectural stability relies on good governance.
Tagging and Resource Control
You should know how to tag assets properly (e.g., VPC, subnets, transit gateways) to support ownership, billing, and auditing boundaries. The ability to filter network logs, apply policies, and isolate environments based on tags is a common exam expectation when designing enterprise network estates.
Shared Services Governance
In a multi-account enterprise, you must design shared hubs—Transit Gateways, DNS resolvers, central monitoring—while respecting account isolation. Know when to centralize vs. federate control and how to synchronize route announcements across boundaries. Exam questions may ask: who controls central route tables, who updates policies, or how changes are gated across business units.
Compliance and Encryption Standards
You will need to apply encryption at rest and in transit based on regulatory needs. Whether it’s customer-managed keys, TLS versioning, or key rotation schemes, make sure you can map compliance requirements to network design. For encrypted traffic inspection, you could justify chaining inspection with TLS decryption and re-encryption, while preserving security posture.
Cost-aware Designs
Big architectures can cost more than expected. When designing connectivity, you must balance performance with cost. For example, using a high-bandwidth Direct Connect link adds cost, but multiplying parallel links may not provide value. Similarly, placing NAT or inspection at the wrong scale can incur unnecessary charges. Exam questions may ask you to optimize for performance while minimizing the cost per traffic GB.
Chapter 4: Incident Response and Forensics
Cloud networks are living systems, and when events occur, you’re expected to respond quickly and effectively.
Alert Strategy
Your exam may outline a DDoS, route hijacking, or unexpected policy change. You need to describe how you detect the event, via anomaly thresholds in flow logs, unexpected route withdrawals in cloud monitoring, or spikes in load balancer metrics.
Investigation Techniques
Once triggered, you must know where to gather forensic evidence. This may involve cross-referencing VPC Flow Logs, gateway logs, route history, or firewall inspection logs. You should illustrate tactics like tracing session histories, identifying unauthorized egress traffic, or retracing modified security group rules.
Response Playbooks
After identifying the attack, you must act—either by isolating NAT gateways, quarantining subnets, adding route filters, or rolling back recent changes. Be prepared to describe how to limit blast radius without losing network continuity, perhaps rerouting traffic to hardened paths or shutting down compromised transit nodes.
Chapter 5: Complex Integrations and Emerging Patterns
Finally, advanced networking demands understanding cross-domain integrations and emerging cloud-native patterns.
Hybrid VPN + Transit + Inspection
The most intricate exam scenarios involve combining hybrid links with regional transits and inspection chains. You must explain how to influence traffic paths, maintain encryption, preserve diagnostic visibility, and ensure seamless failover across laye, s—often involving both zone and region boundaries.
Microsegmentation and Zero Trust
You should know how to restrict communication using subnet-based routing, VPC security groups, network ACLs, and service-level firewall rules. For zero trust concepts, you might argue in favor of application-layer segmentation while preserving auditability, balanced with centralized transit for shared services.
DNS Integration and Traffic Steering
How do you balance multi-region traffic using DNS—weighted, latency-based, or geo-based routing? How do you integrate private resolution and service endpoints for hybrid clouds? You must argue design patterns that account for failure detection, TTL overrides, and clear record propagation paths.
λ-driven Network Status and Auto-healing
Advanced operational architecture can leverage functions that detect degraded connectivity and perform automatic self-healing st, ps—replacing route entries, triggering automation pipelines, or scaling gateway resources. The PEN asks for event-driven automation, so be prepared to sketch how autoscaling, failover, and reconfigurataren is triggered via cloud-native functions, logs, and SNMP traps.
The New Frontier — Cloud Networking Mastery and Career Transformation
Cloud networking is not merely an extension of traditional data center practices; it is a radically redefined paradigm. For those transitioning into this arena—especially from a traditional network security or DevSecOps background—the path is both a rediscovery and a reformation. After passing the AWS Certified Advanced Networking – Specialty exam, there emerges a shift in not only how infrastructure is designed but also how one’s career narrative unfolds
The Exam as a Catalyst for Identity Shift
One of the most understated impacts of achieving this certification is the internal transformation that takes place. The exam is notoriously difficult, not because it introduces entirely alien technologies, but because it demands a holistic, interconnected view of how cloud systems behave under pressure, at scale, and across hybrid scenarios. Many engineers approach it thinking of it as just another test of knowledge. But by the end, what they gain is a new lens through which to view infrastructure—one that is proactive rather than reactive, design-first rather than patchwork-driven.
This shift in perspective often signals a deep evolution of identity. You no longer think of yourself as an operations engineer or a ticket-resolver. You begin thinking like a systems designer—someone who engineers trust boundaries, resiliency models, policy enforcements, and scalable network topologies. You find yourself engaging in high-level dialogues about performance trade-offs, cost versus latency, control planes versus data planes, and multi-region failover strategies. The language you use changes, and so does the level of trust your organization places in you.
Mentorship, Team Leadership, and Sharing the Wisdom
With new knowledge comes a new responsibility. Those who complete the ANS-C01 exam with real-world experience under their belt often become the natural mentors in their teams. This is not because they know every command or every combination of service integrations by heart, but because they can now see the entire playing field. They can explain when to use VPC Peering versus Transit Gateway, when a Gateway Load Balancer makes sense over an NLB, or how hybrid DNS resolution should be crafted using Route 53 Resolver endpoints and forwarding rules.
Mentorship at this level is not about one-off training sessions or lunch-and-learn slideshows. It becomes embedded in design reviews, daily standups, and incident retrospectives. You become the voice that asks the questions others don’t think to ask: “Is this cross-AZ data transfer aligned with our cost profile?” or “What’s our failover plan for the Direct Connect if the on-prem link goes down?” You also begin to coach teammates on how to interpret metrics and logs in the context of network health. The ability to teach concepts like packet flow, route propagation, and NAT behavior in AWS is a high-leverage skill that accelerates team maturity.
Architecture as Strategy: Design Beyond the Console
Post-exam, the architect’s mindset starts solidifying. It becomes second nature to decouple problem-solving from tools. Rather than jumping into the console to tweak settings or deploy yet another transit route, you find yourself diagramming flows, documenting assumptions, and writing design rationales. This is the beginning of architecture as strategic thinking, rather than tactical execution.
There’s a sense of freedom that comes with truly understanding how the various components of AWS networking can be molded to meet a unique business case. Whether you’re connecting hundreds of branch offices through SD-WAN over Transit Gateway, building private SaaS environments for multiple tenants with VPC Lattice-style constructs, or enforcing tenant isolation using segmentation patterns with Network Firewall, you are designing narratives, not just diagrams.
These solutions require not just the technical how, but the human why—communicating risks, costs, trade-offs, and benefits to leadership teams, auditors, and stakeholders who may not understand the technology, but do understand business impact.
Mastery in the Shadows: Debugging Distributed Systems
One often overlooked aspect of post-certification maturity is the improved ability to troubleshoot distributed cloud systems. These are not environments where ping and traceroute alone provide answers. Instead, you now have to think in layers—understanding how Security Group rule evaluations cascade across ENIs, how route tables interact with NAT and IGWs, how VPC Flow Logs can mislead if sampling is misunderstood, and how TLS termination inside a GWLB service may or may not preserve original headers necessary for downstream logic.
Real-world debugging in AWS networking often feels like forensic analysis. By mastering the diagnostic art through experience and structured learning, you begin to identify not only the issue, but patterns that might lead to future failures. Whether it’s a flaky connection across an inter-region peering setup or a rogue lambda opening unexpected ephemeral ports that flood your NACL quotas, the deeper knowledge base allows you to investigate with rigor and resolve with confidence.
Career Elevation Through Narrative
The act of passing this exam is itself a story worth telling—not just to colleagues or peers, but to yourself. It is the articulation of a personal evolution, the clarity of purpose that arises from deciding to push through the complexity, the frustration, and the fatigue. Sharing this story, whether through informal team discussions or published posts, not only inspires others but clarifies your own trajectory.
This narrative becomes useful in every performance review, promotion discussion, job interview, or mentorship session. The story isn’t just about the exam—it’s about what changed in you because of it. You started thinking like a network strategist. You stopped fearing multi-region traffic flow designs. You understood why static route injection from SD-WAN systems needs special care inside TGW attachments. You realized that architecture is less about knowing answers and more about asking the right questions.
Exploring the Cloud-Edge Intersection
Another rich area that opens post-certification is the cloud-edge convergence. As businesses increasingly operate across multiple clouds, SaaS platforms, and physical sites, the ability to design and optimize connectivity across these domains becomes invaluable. You start to explore technologies such as edge caching, latency-aware routing, cross-cloud load balancing, and global failover strategies. You might even delve into integrating traditional MPLS networks with modern SD-WAN approaches over Direct Connect.
Moreover, as compute pushes to the edge in forms such as IoT gateways or localized Kubernetes clusters, the relevance of your expertise expands. Networking is no longer just about keeping packets flowing; it’s about ensuring secure, high-throughput, context-aware connectivity between humans, services, and machines across the globe.
Strategic Vision and Long-Term Adaptability
Cloud platforms will continue to evolve. The services you know today may be replaced or abstracted away in the future. But what remains is the architecture mindset. It is the habit of thinking systematically, asking the hard questions, visualizing end-to-end flow, and identifying the smallest change that yields the greatest benefit.
In this way, preparing for and passing the exam becomes an inflection point. It teaches you not just what is available now, but how to learn and adapt to what comes next. Whether you move into roles like Principal Engineer, Infrastructure Lead, or Cloud Security Architect, the long-term adaptability fostered by this journey stays with you.
You now have a foundation upon which to build even more complex and resilient systems. Perhaps you’ll help your company adopt a service mesh across hundreds of microservices with multi-tenant routing controls. Maybe you’ll build a global network mesh that powers thousands of game clients across latency-sensitive connections. Or maybe you’ll pivot toward governance, ensuring that every network decision made across teams aligns with principles of least privilege, zero trust, and sustainable design.
Final Reflection
In the end, the certification is more than a badge. It is a turning point in how you see your role in the tech ecosystem. You’re no longer a passive executor of playbooks. You’re an active shaper of connectivity, an enabler of digital transformation, and a guardian of performance and security in the vast, shifting terrain of the cloud.
This is what it means to master cloud networking—not just to pass a test, but to elevate how you think, act, and lead.