Book description
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems.The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success.
* The first book devoted exclusively to managing IT security projects
* Expert authors combine superb project management skills with in-depth coverage of highly complex security projects
* By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments
Table of contents
- Cover (1/3)
- Cover (2/3)
- Cover (3/3)
- Contents (1/3)
- Contents (2/3)
- Contents (3/3)
- Foreword
- Acknowledgments
-
Chapter 1: IT Security Project Management Building Blocks
- Introduction
- Corporate Security Project Plan Components
- The True Cost of Security (1/3)
- The True Cost of Security (2/3)
- The True Cost of Security (3/3)
- Project Success Factors (1/2)
- Project Success Factors (2/2)
- Project Constraints
- Corporate Strategy and IT Security
- How Corporate Culture and Policies Impact IT Security (1/2)
- How Corporate Culture and Policies Impact IT Security (2/2)
-
Chapter 2: Defining the Security Project
- Introduction
- Defining the Security Problem
- Defining the Outcome
- Defining Potential Security Project Solutions
- Defining the Optimal Security Project Solution
- Applying Security Project Constraints
- Developing the Security Project Proposal
- Identifying the Security Project Sponsor (1/2)
- Identifying the Security Project Sponsor (2/2)
-
Chapter 3: Organizing the IT Security Project
- Introduction
- Identifying the IT Security Project Team
- Identifying IT Security Project Stakeholders
- Defining IT Security Project Requirements
- Defining IT Security Project Objectives
- Defining IT Security Project Processes (1/3)
- Defining IT Security Project Processes (2/3)
- Defining IT Security Project Processes (3/3)
- Chapter 4: Building Quality Into IT Security Projects
- Chapter 5: Forming the IT Security Project Team
-
Chapter 6: Planning The IT Security Project
- Introduction
- Creating the IT Security Project Work Breakdown Structure
- Defining Project Tasks and Sub-tasks
- Checking Project Scope
- Developing Task Details (1/2)
- Developing Task Details (2/2)
- Identifying and Working With the Critical Path
- Testing IT Security Project Results
- Budget, Schedule, Risks, and Communications (1/2)
- Budget, Schedule, Risks, and Communications (2/2)
-
Chapter 7: Managing the IT Security Project
- Introduction
- Initiating the IT Security Project
- Monitoring and Managing IT Security Project Progress (1/2)
- Monitoring and Managing IT Security Project Progress (2/2)
- Monitoring IT Security Project Risk
- Managing IT Security Project Change
- Testing IT Security Project Results (1/2)
- Testing IT Security Project Results (2/2)
- Chapter 8: Closing Out the IT Security Project
-
Chapter 9: Corporate IT Security Project Plan
- Introduction
- Defining Your Security Strategy
- Legal Standards Relevant to Corporate IT Security (1/4)
- Legal Standards Relevant to Corporate IT Security (2/4)
- Legal Standards Relevant to Corporate IT Security (3/4)
- Legal Standards Relevant to Corporate IT Security (4/4)
- Corporate IT Security Project Plan Overview
- Corporate Security Auditing (1/2)
- Corporate Security Auditing (2/2)
- Corporate IT Security Project Parameters (1/3)
- Corporate IT Security Project Parameters (2/3)
- Corporate IT Security Project Parameters (3/3)
- Project Work Breakdown Structure (1/2)
- Project Work Breakdown Structure (2/2)
- Project Risks
- Project Constraints
- Project Assumptions
- Project Schedule and Budget
-
Chapter 10: General IT Security Plan
- Introduction
- IT Security Assessment and Auditing
- Authentication
- Access Control
- Auditing (1/2)
- Auditing (2/2)
- Attacks
- Assessment and Audit Report
- Project Plan
- General IT Security Project Parameters (1/2)
- General IT Security Project Parameters (2/2)
- General IT Security Project Plan (1/3)
- General IT Security Project Plan (2/3)
- General IT Security Project Plan (3/3)
-
Chapter 11: IT Infrastructure Security Plan
- Introduction
- Infrastructure Security Assessment
- Project Parameters (1/3)
- Project Parameters (2/3)
- Project Parameters (3/3)
- Project Team
- Project Organization
- Project Work Breakdown Structure
- Project Risks and Mitigation Strategies
- Project Constraints and Assumptions
- Project Schedule and Budget
- IT Infrastructure Security Project Outline (1/2)
- IT Infrastructure Security Project Outline (2/2)
-
Chapter 12: Wireless Security Project Plan
- Introduction
- Wireless Security Auditing (1/9)
- Wireless Security Auditing (2/9)
- Wireless Security Auditing (3/9)
- Wireless Security Auditing (4/9)
- Wireless Security Auditing (5/9)
- Wireless Security Auditing (6/9)
- Wireless Security Auditing (7/9)
- Wireless Security Auditing (8/9)
- Wireless Security Auditing (9/9)
- Wireless Security Project Parameters (1/3)
- Wireless Security Project Parameters (2/3)
- Wireless Security Project Parameters (3/3)
- Project Team
- Project Organization
- Project Work Breakdown Structure
- Project Risks
- Project Constraints and Assumptions
- Project Schedule and Budget
- Wireless Security Project Outline (1/2)
- Wireless Security Project Outline (2/2)
-
Chapter 13: IT Operational Security Plan
- Introduction
- Operational Security Assessment (1/10)
- Operational Security Assessment (2/10)
- Operational Security Assessment (3/10)
- Operational Security Assessment (4/10)
- Operational Security Assessment (5/10)
- Operational Security Assessment (6/10)
- Operational Security Assessment (7/10)
- Operational Security Assessment (8/10)
- Operational Security Assessment (9/10)
- Operational Security Assessment (10/10)
- Project Parameters (1/3)
- Project Parameters (2/3)
- Project Parameters (3/3)
- Project Team
- Project Organization
- Project Work Breakdown Structure
- Project Risks and Mitigation Strategies
- Project Constraints and Assumptions
- Project Schedule and Budget
- IT Operational Security Project Outline (1/2)
- IT Operational Security Project Outline (2/2)
- Index (1/4)
- Index (2/4)
- Index (3/4)
- Index (4/4)
Product information
- Title: Syngress IT Security Project Management Handbook
- Author(s):
- Release date: July 2006
- Publisher(s): Syngress
- ISBN: 9780080489773
You might also like
book
Information Security Policy Development for Compliance
Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards …
book
Writing Information Security Policies
Administrators, more technically savvy than their managers, have started to secure the networks in a way …
book
The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide
A clear, concise primer on the CMMC (Cybersecurity Maturity Model Certification), this pocket guide: Summarizes the …
video
Risk Management for Cybersecurity and IT Managers
Have you ever wondered why your organization's executives or your manager made a decision to fund …