دورة PMITS
دورة إدارة المشاريع فى مجال تكنولوجيا المعلومات ومخططات الأمن
فى البداية كلمة (PMITS) إختصار لجملة Project Management in IT Security
وتعنى إدارة المشاريع فى مجال تكنولوجيا المعلومات ومخططات الأمن
وصف الكورس:
برنامج إدارة المشاريع فى مجال تكنولوجيا الأمن هى دورة تفاعلية ليومين تهدف إلى تعليم تكنولوجيا المعلومات للمهنيين للأمن المعلومات الحقيقيون وقت تنفيذ ممارسات إدارة المشاريع فى مجال تكنولوجيا المعلومات والتخطيط الأمنى ويغطى بصورة شامله مكونات مشاريع الشركات والخطط الأمنية وتكاليفها فى مجال أمن المعلومات الأساسية لمشروع ناجح والقيود على المشروع وإستراتيجات الشركات المنافسة وأمن تكنولوجيا المعلومات وتأثير ذلك على ثقافة الشركات فى تكنولوجبا المعلومات والسياسات الأمنية .
سوف يتعلم الطلاب تحديد المسائل المختلفة التى تنشأ أثناء عملية التخطيط للأمن على مستوى المنظمة وكيفية تجنبها والقضاء عليها
.
لمن هذه الدورة:
مديرى خوادم الشبكات ومسئولى نظم والعاملين على تقييم المخاطر
يمكن إجتياز الأمتحان exam 212-38 فى أخر يوم يوم من أيام الدورة ويجب على الطالب إجتياز إمتحان شهادة CEP أولا
محتويات الدورة
Project Management in IT SecurityCourse Outline
Module 01: Components of Project Management in IT Security
* Defining a Project
* Introduction
* The Security Issue
* Role of Network Security
* Integrity, Confidentiality and Availability
* The Outcome
* Various Possible Security Project Solutions
* The Optimal Solution
* Limitations of Security Project
* Scope of Project
* Dead Lines
* Quality
* Economy
* Develop the Proposal
* Identify the Sponsor for the Security Project
* Corporate Security Project Plan Components
* The Costs involved in Security
* Basis for Success of a Project
* Well Defined Project Objectives
* Minimized and Well Defined Scope
* Smaller Schedules
* Experienced Project Manager
* Executive Support
* User Involvement
* Well Defined Project Management Process
* Limitations of a Project
* Corporate Strategy and IT Security
* Importance of the influence of Corporate Culture and Policies on IT Security
Module 02: Organizing the IT Security Project
* Introduction
* Making of the IT Security Project Team
* The IT Security Project Stakeholders
* Requirement Specifications of the IT Security Project
* Objectives of the IT Security Project
* Processes involved in the IT Security Project
* The Acceptance Criteria
* Risk Management
* Change Management
* Communication
* Quality
* Status Reports
* Defect Tracking
* Escalation Process
* Documentation
* Approval Procedures
* Deployment
* Operations
* Training
Module 03: Developing the IT Security Project Team
* Introduction
* List of the IT Security Project Team Requirements
* Roles and Responsibilities
* Skill Set
* Technical Skill Set
* Communication Ability
* Training and Negotiation
* Ability to Negotiate and Understanding of Technical Aspects
* Reporting
* Legality, Regulations and Cost Factors
* Identifying the Staffing Requirements and Constraints
* Hiring the Staff
* Developing the IT Project Team
* Training Objectives
* Team-building
Module 04: Planning the IT Security Project
* Structuring the details of IT Security Project Work
* Project Tasks and Sub-tasks in the Project
* Verifying Scope of the Project
* Tasks in Detail
* Ownership
* Resources
* Priority
* Schedule
* Budget Allocated
* Project Dependencies
* Limitations
* Experience
* Tools
* Budget Constraints
* Change in the Organization
* Government or Regulatory Requirements
* The Critical Path
* Testing the Results
* Defining the Budget, Schedule, Risks, and Communications
Module 05: Managing the IT PM
* Start of the IT Security Project
* Examine and Organize the IT Security Project Progress
* Authentication
* Issue Report and Rectification
* Documentation
* Manage the IT Security Project Risk
* Change Management in the IT Security Project
* Potential Customers
* Staff
* Environmental
* Test the IT Security Project Results
Module 06: Building Quality into IT Security Projects
* Introduction
* Quality in the IT Security Project
* User Requirements
* Functional Specifications
* Technical Requirements
* Acceptance Criteria
* Quality Metrics
* Operational Standards of the IT Project
* Monitoring IT Security Project Quality
* Test the IT Security Project Quality
Module 07: Closing Out the IT PM
* Introduction
* Evaluate the Project on Completion
* Close all Open Issues, Change Requests, and Error Reports
* Prepare for Implementation, Deployment, and Operational Transfer
* Review the Lessons Learned
* Documentation and Compliance Reports
Module 08: Define a Corporate IT Project Plan
* Define a Security Strategy for the IT Project
* Legal Standards
* Gramm-Leach-Bliley Act
* Health Insurance Portability and Accountability Act 195 Sarbanes-Oxley Act
* Federal Information Security and Management Act
* FERPA and the TEACH Act
* Electronic Communications Privacy Act and Computer Fraud and Abuse Act
* Law concerning Unauthorized Access
* Myths and Facts
* Private Entity
* Penetration Test
* Legal Liability and Related Tools
* Legal Assessment and Implementation in Corporate Scenario
* Define Rights and Protection and involvement of Certified third-party individuals
* Standards and Insurance
* Overview of the Corporate IT Security Project Plan
* Security Auditing
* Reasons for Security Breaches
* Factors of the Corporate IT Security Project
* Goals of the IT Security Project
* Scope, Timing, Budget and Quality
* Skills related to Operating System, Networking, Application Security, Security Tools, and Programming
* Project Work Breakdown Structure and Examples
* Risks associated with the Project
* Project Constraints
* Project Assumptions
* Project Schedule and Budget
* Closing Out the Project
* IT Infrastructure Security Project Plan
* Infrastructure Security Assessment
* Information
* People and Process
* Policies
* Compliance with Processes
* Technology
* Establishing Baselines
* Recognizing External Threats
* Network Security Checklist
* Project Parameters
* Project Team
* Project Organization
* Project Work Breakdown Structure
* Risks Mitigation Strategies
* Project Constraints and Assumptions
* Project Schedule and Budget
* Overview of Infrastructure Security Project
Module 09: General IT Security Plan
* IT Security Assessment and Audit
* Perimeters
* The Internal Network
* Information
* Risk Assessments
* Vulnerability Scanning and Penetration Testing
* Risk Assessment
* Impact Analysis
* Authentication
* Access Control
* Auditing
* Review the Policy
* Review the Procedures
* Review the Operations
* Requisites of Legal Reporting
* Attacks
* Assessment and Audit Report
* Entries in the Finding Report
* Planning of the Project
* General IT Security Project Parameters
* Requirements
* Scope, Schedule, Budget, Skill Sets and Procedures
* General IT Security Project Plan
* Project WBS, Constraints, Schedule and Budget
* Wireless Security Project Plan
* Wireless Security Auditing
* Types of Wireless Devices
* Wireless Threats
* Risk Assessment
* Impact Analysis
* Project Parameters
* Requirements
* Scope, Schedule, Budget, Skill Sets and Procedures
* Project Team
* Project Organization
* Project Work Breakdown Structure
* Project Risks and Mitigation Strategies
* Project Constraints and Assumptions
* Project Schedule and Budget
* Wireless Security Project Outline
Module 10: IT Operational Security Plan
* Operational Security Assessment
* Incident Response
* The Response Team
* Policies
* Disaster Recovery
* Regulatory Issues
* Health Insurance Portability and Accountability Act
* Gramm-Leach-Bliley Act
* Sarbanes-Oxley Act
* Project Parameters
* Issue, Solution, Scope, Cost, Time, Quality, Functional Specifications and Skill Set
* Project Team
* Project Organization
* Project Work Breakdown Structure
* Project Risks and Mitigation Strategies
* Incident Response
* Policy Management
* Disaster Planning
* Regulatory/Compliance
* Project Constraints and Assumptions
* Project Schedule and Budget
* Overview of the Operational Security Project
دورة إدارة المشاريع فى مجال تكنولوجيا المعلومات ومخططات الأمن
فى البداية كلمة (PMITS) إختصار لجملة Project Management in IT Security
وتعنى إدارة المشاريع فى مجال تكنولوجيا المعلومات ومخططات الأمن
وصف الكورس:
برنامج إدارة المشاريع فى مجال تكنولوجيا الأمن هى دورة تفاعلية ليومين تهدف إلى تعليم تكنولوجيا المعلومات للمهنيين للأمن المعلومات الحقيقيون وقت تنفيذ ممارسات إدارة المشاريع فى مجال تكنولوجيا المعلومات والتخطيط الأمنى ويغطى بصورة شامله مكونات مشاريع الشركات والخطط الأمنية وتكاليفها فى مجال أمن المعلومات الأساسية لمشروع ناجح والقيود على المشروع وإستراتيجات الشركات المنافسة وأمن تكنولوجيا المعلومات وتأثير ذلك على ثقافة الشركات فى تكنولوجبا المعلومات والسياسات الأمنية .
سوف يتعلم الطلاب تحديد المسائل المختلفة التى تنشأ أثناء عملية التخطيط للأمن على مستوى المنظمة وكيفية تجنبها والقضاء عليها
.
لمن هذه الدورة:
مديرى خوادم الشبكات ومسئولى نظم والعاملين على تقييم المخاطر
يمكن إجتياز الأمتحان exam 212-38 فى أخر يوم يوم من أيام الدورة ويجب على الطالب إجتياز إمتحان شهادة CEP أولا
محتويات الدورة
Project Management in IT SecurityCourse Outline
Module 01: Components of Project Management in IT Security
* Defining a Project
* Introduction
* The Security Issue
* Role of Network Security
* Integrity, Confidentiality and Availability
* The Outcome
* Various Possible Security Project Solutions
* The Optimal Solution
* Limitations of Security Project
* Scope of Project
* Dead Lines
* Quality
* Economy
* Develop the Proposal
* Identify the Sponsor for the Security Project
* Corporate Security Project Plan Components
* The Costs involved in Security
* Basis for Success of a Project
* Well Defined Project Objectives
* Minimized and Well Defined Scope
* Smaller Schedules
* Experienced Project Manager
* Executive Support
* User Involvement
* Well Defined Project Management Process
* Limitations of a Project
* Corporate Strategy and IT Security
* Importance of the influence of Corporate Culture and Policies on IT Security
Module 02: Organizing the IT Security Project
* Introduction
* Making of the IT Security Project Team
* The IT Security Project Stakeholders
* Requirement Specifications of the IT Security Project
* Objectives of the IT Security Project
* Processes involved in the IT Security Project
* The Acceptance Criteria
* Risk Management
* Change Management
* Communication
* Quality
* Status Reports
* Defect Tracking
* Escalation Process
* Documentation
* Approval Procedures
* Deployment
* Operations
* Training
Module 03: Developing the IT Security Project Team
* Introduction
* List of the IT Security Project Team Requirements
* Roles and Responsibilities
* Skill Set
* Technical Skill Set
* Communication Ability
* Training and Negotiation
* Ability to Negotiate and Understanding of Technical Aspects
* Reporting
* Legality, Regulations and Cost Factors
* Identifying the Staffing Requirements and Constraints
* Hiring the Staff
* Developing the IT Project Team
* Training Objectives
* Team-building
Module 04: Planning the IT Security Project
* Structuring the details of IT Security Project Work
* Project Tasks and Sub-tasks in the Project
* Verifying Scope of the Project
* Tasks in Detail
* Ownership
* Resources
* Priority
* Schedule
* Budget Allocated
* Project Dependencies
* Limitations
* Experience
* Tools
* Budget Constraints
* Change in the Organization
* Government or Regulatory Requirements
* The Critical Path
* Testing the Results
* Defining the Budget, Schedule, Risks, and Communications
Module 05: Managing the IT PM
* Start of the IT Security Project
* Examine and Organize the IT Security Project Progress
* Authentication
* Issue Report and Rectification
* Documentation
* Manage the IT Security Project Risk
* Change Management in the IT Security Project
* Potential Customers
* Staff
* Environmental
* Test the IT Security Project Results
Module 06: Building Quality into IT Security Projects
* Introduction
* Quality in the IT Security Project
* User Requirements
* Functional Specifications
* Technical Requirements
* Acceptance Criteria
* Quality Metrics
* Operational Standards of the IT Project
* Monitoring IT Security Project Quality
* Test the IT Security Project Quality
Module 07: Closing Out the IT PM
* Introduction
* Evaluate the Project on Completion
* Close all Open Issues, Change Requests, and Error Reports
* Prepare for Implementation, Deployment, and Operational Transfer
* Review the Lessons Learned
* Documentation and Compliance Reports
Module 08: Define a Corporate IT Project Plan
* Define a Security Strategy for the IT Project
* Legal Standards
* Gramm-Leach-Bliley Act
* Health Insurance Portability and Accountability Act 195 Sarbanes-Oxley Act
* Federal Information Security and Management Act
* FERPA and the TEACH Act
* Electronic Communications Privacy Act and Computer Fraud and Abuse Act
* Law concerning Unauthorized Access
* Myths and Facts
* Private Entity
* Penetration Test
* Legal Liability and Related Tools
* Legal Assessment and Implementation in Corporate Scenario
* Define Rights and Protection and involvement of Certified third-party individuals
* Standards and Insurance
* Overview of the Corporate IT Security Project Plan
* Security Auditing
* Reasons for Security Breaches
* Factors of the Corporate IT Security Project
* Goals of the IT Security Project
* Scope, Timing, Budget and Quality
* Skills related to Operating System, Networking, Application Security, Security Tools, and Programming
* Project Work Breakdown Structure and Examples
* Risks associated with the Project
* Project Constraints
* Project Assumptions
* Project Schedule and Budget
* Closing Out the Project
* IT Infrastructure Security Project Plan
* Infrastructure Security Assessment
* Information
* People and Process
* Policies
* Compliance with Processes
* Technology
* Establishing Baselines
* Recognizing External Threats
* Network Security Checklist
* Project Parameters
* Project Team
* Project Organization
* Project Work Breakdown Structure
* Risks Mitigation Strategies
* Project Constraints and Assumptions
* Project Schedule and Budget
* Overview of Infrastructure Security Project
Module 09: General IT Security Plan
* IT Security Assessment and Audit
* Perimeters
* The Internal Network
* Information
* Risk Assessments
* Vulnerability Scanning and Penetration Testing
* Risk Assessment
* Impact Analysis
* Authentication
* Access Control
* Auditing
* Review the Policy
* Review the Procedures
* Review the Operations
* Requisites of Legal Reporting
* Attacks
* Assessment and Audit Report
* Entries in the Finding Report
* Planning of the Project
* General IT Security Project Parameters
* Requirements
* Scope, Schedule, Budget, Skill Sets and Procedures
* General IT Security Project Plan
* Project WBS, Constraints, Schedule and Budget
* Wireless Security Project Plan
* Wireless Security Auditing
* Types of Wireless Devices
* Wireless Threats
* Risk Assessment
* Impact Analysis
* Project Parameters
* Requirements
* Scope, Schedule, Budget, Skill Sets and Procedures
* Project Team
* Project Organization
* Project Work Breakdown Structure
* Project Risks and Mitigation Strategies
* Project Constraints and Assumptions
* Project Schedule and Budget
* Wireless Security Project Outline
Module 10: IT Operational Security Plan
* Operational Security Assessment
* Incident Response
* The Response Team
* Policies
* Disaster Recovery
* Regulatory Issues
* Health Insurance Portability and Accountability Act
* Gramm-Leach-Bliley Act
* Sarbanes-Oxley Act
* Project Parameters
* Issue, Solution, Scope, Cost, Time, Quality, Functional Specifications and Skill Set
* Project Team
* Project Organization
* Project Work Breakdown Structure
* Project Risks and Mitigation Strategies
* Incident Response
* Policy Management
* Disaster Planning
* Regulatory/Compliance
* Project Constraints and Assumptions
* Project Schedule and Budget
* Overview of the Operational Security Project
0 التعليقات:
إرسال تعليق