Example: After a module on cybersecurity threat modeling, participants submitted short threat analyses for peer review; industry mentors then provided concise critiques illustrating trade-offs in mitigation strategies. Assessment emphasized application over rote recall: project-based tasks, reproducible experiments, and reflective write-ups showing how learners would adapt techniques to their contexts.