Skip to content

Project Management in IT Security - Corporate Training


Bright Solutions Global PLC

Summary

Price
Enquire to get more info on pricing
Study method
Onsite
Duration
2 days
Qualification
No formal qualification

Overview

The first step in developing a solid IT security project plan is to define the problem. We can easily state that the problem is “our networks are not secure or that there are assets in the organization that need to be protected from intentional and unintentional attacks.” Those statements are true on the macro level, meaning that these general statements apply to almost every organization (and computer) in the world. However, every company is different and every organization has its own unique set of security vulnerabilities to consider. Applying a one-size-fits-all approach to network security will not work.

An effective way to approach IT security is to create a corporate security plan that includes the individual focus areas of security (e.g., infrastructure, wireless). Breaking down each of the segments into smaller, individual focus areas allows you to manage each aspect of security better. Another challenge you will encounter is that there are many areas that overlap (i.e., does physical access fall under operational security, infrastructure security, or general security?).

Creating a corporate IT security plan and individual plans gives you the opportunity to review your overall security project plan to ensure that all critical security elements are addressed.

Description

Course Outline

Module 01: Components of Project Management in IT Security
* Defining a Project
* Corporate Security Project Plan Components
* The Costs involved in Security
* Basis for Success of a Project
* Limitations of a Project
* Corporate Strategy and IT Security
* Importance of the influence of Corporate Culture and Policies on IT Security

Module 02: Organizing the IT Security Project
* Introduction
* Making of the IT Security Project Team
* The IT Security Project Stakeholders
* Requirement Specifications of the IT Security Project
* Objectives of the IT Security Project
* Processes involved in the IT Security Project

Module 03: Developing the IT Security Project Team
* Introduction
* List of the IT Security Project Team Requirements
* Identifying the Staffing Requirements and Constraints
* Hiring the Staff
* Developing the IT Project Team

Module 04: Planning the IT Security Project
* Structuring the details of IT Security Project Work
* Project Tasks and Sub-tasks in the Project
* Verifying Scope of the Project
* Tasks in Detail
* Testing the Results
* Defining the Budget, Schedule, Risks, and Communications

Module 05: Managing the IT PM
* Start of the IT Security Project
* Examine and Organize the IT Security Project Progress
* Manage the IT Security Project Risk
* Change Management in the IT Security Project
* Test the IT Security Project Results

Module 06: Building Quality into IT Security Projects
* Introduction
* Quality in the IT Security Project
* Test the IT Security Project Quality

Module 07: Closing Out the IT PM
* Introduction
* Evaluate the Project on Completion
* Close all Open Issues, Change Requests, and Error Reports
* Prepare for Implementation, Deployment, and Operational Transfer
* Review the Lessons Learned
* Documentation and Compliance Reports

Module 08: Define a Corporate IT Project Plan
* Define a Security Strategy for the IT Project
* Legal Standards
* Security Auditing
* Factors of the Corporate IT Security Project
* Project Work Breakdown Structure and Examples
* Project Constraints
* Project Assumptions
* Project Schedule and Budget
* Closing Out the Project
* IT Infrastructure Security Project Plan

Module 09: General IT Security Plan
* IT Security Assessment and Audit
* Access Control
* Auditing
* Attacks
* Assessment and Audit Report
* General IT Security Project Parameters
* General IT Security Project Plan
* Wireless Security Project Plan
Module 10: IT Operational Security Plan
* Operational Security Assessment
* Project Organization
* Project Work Breakdown Structure
* Project Risks and Mitigation Strategies
* Project Constraints and Assumptions
* Project Schedule and Budget
* Overview of the Operational Security Project

Who is this course for?

* People involved with security planning
* Network server administrators
* System Administrators
* Risk Assessment professionals

Questions and answers

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.