Project Management in IT Security

Course#: BSSEC1124

About this Course

Course Type Course Code Duration
Software Security BSSEC1124 2 Days

The first step in developing a solid IT security project plan is to define the problem. We can easily state that the problem is “our networks are not secure or that there are assets in the organization that need to be protected from intentional and unintentional attacks.” Those statements are true on the macro level, meaning that these general statements apply to almost every organization (and computer) in the world. However, every company is different and every organization has its own unique set of security vulnerabilities to consider. Applying a one-size-fits-all approach to network security will not work.

An effective way to approach IT security is to create a corporate security plan that includes the individual focus areas of security (e.g., infrastructure, wireless). Breaking down each of the segments into smaller, individual focus areas allows you to manage each aspect of security better. Another challenge you will encounter is that there are many areas that overlap (i.e., does physical access fall under operational security, infrastructure security, or general security?).

Creating a corporate IT security plan and individual plans gives you the opportunity to review your overall security project plan to ensure that all critical security elements are addressed.

Why Attend this Course?

What Makes this Course Stand Apart?

Accelerator Plus1

What you will Learn?

* Components of Project Management in IT Security
* Legal standards related to corporate IT security
* How to create a corporate security plan that includes the individual focus areas of security
* How to review your overall security project plan to ensure that all critical security elements are addressed

Audience

* People involved with security planning
* Network server administrators
* System Administrators
* Risk Assessment professionals

Prerequisites

None. Basic computing skills like browsing the web and checking emails.

Course Outline

Module 01: Components of Project Management in IT Security
* Defining a Project
* Corporate Security Project Plan Components
* The Costs involved in Security
* Basis for Success of a Project
* Limitations of a Project
* Corporate Strategy and IT Security
* Importance of the influence of Corporate Culture and Policies on IT Security

Module 02: Organizing the IT Security Project
* Introduction
* Making of the IT Security Project Team
* The IT Security Project Stakeholders
* Requirement Specifications of the IT Security Project
* Objectives of the IT Security Project
* Processes involved in the IT Security Project

Module 03: Developing the IT Security Project Team
* Introduction
* List of the IT Security Project Team Requirements
* Identifying the Staffing Requirements and Constraints
* Hiring the Staff
* Developing the IT Project Team

Module 04: Planning the IT Security Project
* Structuring the details of IT Security Project Work
* Project Tasks and Sub-tasks in the Project
* Verifying Scope of the Project
* Tasks in Detail
* Testing the Results
* Defining the Budget, Schedule, Risks, and Communications

Module 05: Managing the IT PM
* Start of the IT Security Project
* Examine and Organize the IT Security Project Progress
* Manage the IT Security Project Risk
* Change Management in the IT Security Project
* Test the IT Security Project Results

Module 06: Building Quality into IT Security Projects
* Introduction
* Quality in the IT Security Project
* Test the IT Security Project Quality

Module 07: Closing Out the IT PM
* Introduction
* Evaluate the Project on Completion
* Close all Open Issues, Change Requests, and Error Reports
* Prepare for Implementation, Deployment, and Operational Transfer
* Review the Lessons Learned
* Documentation and Compliance Reports

Module 08: Define a Corporate IT Project Plan
* Define a Security Strategy for the IT Project
* Legal Standards
* Security Auditing
* Factors of the Corporate IT Security Project
* Project Work Breakdown Structure and Examples
* Project Constraints
* Project Assumptions
* Project Schedule and Budget
* Closing Out the Project
* IT Infrastructure Security Project Plan

Module 09: General IT Security Plan
* IT Security Assessment and Audit
* Access Control
* Auditing
* Attacks
* Assessment and Audit Report
* General IT Security Project Parameters
* General IT Security Project Plan
* Wireless Security Project Plan
Module 10: IT Operational Security Plan
* Operational Security Assessment
* Project Organization
* Project Work Breakdown Structure
* Project Risks and Mitigation Strategies
* Project Constraints and Assumptions
* Project Schedule and Budget
* Overview of the Operational Security Project

0

Start typing and press Enter to search