Project Management in IT Security - Corporate Training
Bright Solutions Global PLC
Summary
Overview
The first step in developing a solid IT security project plan is to define the problem. We can easily state that the problem is “our networks are not secure or that there are assets in the organization that need to be protected from intentional and unintentional attacks.” Those statements are true on the macro level, meaning that these general statements apply to almost every organization (and computer) in the world. However, every company is different and every organization has its own unique set of security vulnerabilities to consider. Applying a one-size-fits-all approach to network security will not work.
An effective way to approach IT security is to create a corporate security plan that includes the individual focus areas of security (e.g., infrastructure, wireless). Breaking down each of the segments into smaller, individual focus areas allows you to manage each aspect of security better. Another challenge you will encounter is that there are many areas that overlap (i.e., does physical access fall under operational security, infrastructure security, or general security?).
Creating a corporate IT security plan and individual plans gives you the opportunity to review your overall security project plan to ensure that all critical security elements are addressed.
Description
Course Outline
Module 01: Components of Project Management in IT Security
* Defining a Project
* Corporate Security Project Plan Components
* The Costs involved in Security
* Basis for Success of a Project
* Limitations of a Project
* Corporate Strategy and IT Security
* Importance of the influence of Corporate Culture and Policies on IT Security
Module 02: Organizing the IT Security Project
* Introduction
* Making of the IT Security Project Team
* The IT Security Project Stakeholders
* Requirement Specifications of the IT Security Project
* Objectives of the IT Security Project
* Processes involved in the IT Security Project
Module 03: Developing the IT Security Project Team
* Introduction
* List of the IT Security Project Team Requirements
* Identifying the Staffing Requirements and Constraints
* Hiring the Staff
* Developing the IT Project Team
Module 04: Planning the IT Security Project
* Structuring the details of IT Security Project Work
* Project Tasks and Sub-tasks in the Project
* Verifying Scope of the Project
* Tasks in Detail
* Testing the Results
* Defining the Budget, Schedule, Risks, and Communications
Module 05: Managing the IT PM
* Start of the IT Security Project
* Examine and Organize the IT Security Project Progress
* Manage the IT Security Project Risk
* Change Management in the IT Security Project
* Test the IT Security Project Results
Module 06: Building Quality into IT Security Projects
* Introduction
* Quality in the IT Security Project
* Test the IT Security Project Quality
Module 07: Closing Out the IT PM
* Introduction
* Evaluate the Project on Completion
* Close all Open Issues, Change Requests, and Error Reports
* Prepare for Implementation, Deployment, and Operational Transfer
* Review the Lessons Learned
* Documentation and Compliance Reports
Module 08: Define a Corporate IT Project Plan
* Define a Security Strategy for the IT Project
* Legal Standards
* Security Auditing
* Factors of the Corporate IT Security Project
* Project Work Breakdown Structure and Examples
* Project Constraints
* Project Assumptions
* Project Schedule and Budget
* Closing Out the Project
* IT Infrastructure Security Project Plan
Module 09: General IT Security Plan
* IT Security Assessment and Audit
* Access Control
* Auditing
* Attacks
* Assessment and Audit Report
* General IT Security Project Parameters
* General IT Security Project Plan
* Wireless Security Project Plan
Module 10: IT Operational Security Plan
* Operational Security Assessment
* Project Organization
* Project Work Breakdown Structure
* Project Risks and Mitigation Strategies
* Project Constraints and Assumptions
* Project Schedule and Budget
* Overview of the Operational Security Project
Who is this course for?
* People involved with security planning
* Network server administrators
* System Administrators
* Risk Assessment professionals
Questions and answers
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.