Book description
A crucial reference for the practicing or aspiring design consultant, Security Design Consulting brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, Security Design Consulting gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant’s important and growing role in an overall security program.* Focuses on consulting in security design, not security management
* Provides sample service agreements, specifications, and reports to use as models
* Emphasizes the highest technical and ethical standards for this increasingly crucial profession
Table of contents
- Cover
- Copyright page
- Table of contents
- Foreword
- Acknowledgments
- Introduction
- Chapter 1: The Profession of Security Design Consulting
- Chapter 2: How to Get Started
- Chapter 3: Marketing
- Chapter 4: The Proposal
- Chapter 5: Fees and Billing
- Chapter 6: Assessment
- Chapter 7: System Design
- Chapter 8: Determining What Products to Specify
- Chapter 9: Determining Total System Cost
- Chapter 10: The Report
-
Chapter 11: Project Management
- ASSIST IN ATTACHING BID DOCUMENTS TO THE DESIGN SPECIFICATIONS
- ASSIST IN LOCATING AND INVITING QUALIFIED CONTRACTORS TO BID
- LEAD THE PRE-BID CONFERENCE AND WALK-THROUGH
- PROVIDE WRITTEN ANSWERS TO QUESTIONS AT PRE-BID WALK-THROUGH
- APPROVE PRODUCT CHANGES
- ASSIST IN EVALUATION OF BIDS
- REVIEW AND APPROVE ALL SUBMITTALS
- RESPOND TO ANY CONTRACTORS’ REQUESTS FOR INFORMATION
- ATTEND CONSTRUCTION MEETINGS
- CHECK, REVIEW, AND APPROVE INSTALLATION PROGRESS AND TECHNIQUES
- REVIEW AND APPROVE ANY CHANGE ORDERS OR CHANGE IN SCOPE OF WORK
- WITNESS SYSTEM TEST WITH CONTRACTOR
- REVIEW AND APPROVE TEST REPORT
- MAINTAIN PUNCH LIST FOR ANY DEFICIENCIES
- REVIEW AND APPROVE AS-BUILT DRAWINGS AND RECORD OF COMPLETION
- APPROVE CONTRACTOR PAYMENTS
- RESPOND TO OTHER REQUESTS BY CLIENT
- Chapter 12: Forensic Consulting
- Chapter 13: Continuing Education
- Appendix A: Sample Proposals
- Appendix B: Sample Service Agreement
- Appendix C: Sample Assessment Reports
-
Appendix D: Sample Design Specifications
- PART I GENERAL (1/2)
- PART I GENERAL (2/2)
- PART II PRODUCTS (1/8)
- PART II PRODUCTS (2/8)
- PART II PRODUCTS (3/8)
- PART II PRODUCTS (4/8)
- PART II PRODUCTS (5/8)
- PART II PRODUCTS (6/8)
- PART II PRODUCTS (7/8)
- PART II PRODUCTS (8/8)
- PART III EXECUTION (1/3)
- PART III EXECUTION (2/3)
- PART III EXECUTION (3/3)
- Appendix E: Sample Design Drawings (1/2)
- Appendix E: Sample Design Drawings (2/2)
- Appendix F: Sample As-Built Drawings (1/2)
- Appendix F: Sample As-Built Drawings (2/2)
- Index (1/2)
- Index (2/2)
Product information
- Title: Security Design Consulting
- Author(s):
- Release date: May 2007
- Publisher(s): Butterworth-Heinemann
- ISBN: 9780080493053
You might also like
certs-practice-exam
AWS Certified Solutions Architect Associate SAA-002 (Pearson Practice Test)
This Pearson Test Prep practice test contains four full practice exams with hundreds of review questions. …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …
book
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …
book
Threat Modeling: Designing for Security
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of …