Syngress IT Security Project Management Handbook

Book description

The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems.

The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success.

* The first book devoted exclusively to managing IT security projects

* Expert authors combine superb project management skills with in-depth coverage of highly complex security projects

* By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments

Table of contents

  1. Cover (1/3)
  2. Cover (2/3)
  3. Cover (3/3)
  4. Contents (1/3)
  5. Contents (2/3)
  6. Contents (3/3)
  7. Foreword
  8. Acknowledgments
  9. Chapter 1: IT Security Project Management Building Blocks
    1. Introduction
    2. Corporate Security Project Plan Components
    3. The True Cost of Security (1/3)
    4. The True Cost of Security (2/3)
    5. The True Cost of Security (3/3)
    6. Project Success Factors (1/2)
    7. Project Success Factors (2/2)
    8. Project Constraints
    9. Corporate Strategy and IT Security
    10. How Corporate Culture and Policies Impact IT Security (1/2)
    11. How Corporate Culture and Policies Impact IT Security (2/2)
  10. Chapter 2: Defining the Security Project
    1. Introduction
    2. Defining the Security Problem
    3. Defining the Outcome
    4. Defining Potential Security Project Solutions
    5. Defining the Optimal Security Project Solution
    6. Applying Security Project Constraints
    7. Developing the Security Project Proposal
    8. Identifying the Security Project Sponsor (1/2)
    9. Identifying the Security Project Sponsor (2/2)
  11. Chapter 3: Organizing the IT Security Project
    1. Introduction
    2. Identifying the IT Security Project Team
    3. Identifying IT Security Project Stakeholders
    4. Defining IT Security Project Requirements
    5. Defining IT Security Project Objectives
    6. Defining IT Security Project Processes (1/3)
    7. Defining IT Security Project Processes (2/3)
    8. Defining IT Security Project Processes (3/3)
  12. Chapter 4: Building Quality Into IT Security Projects
    1. Introduction
    2. Planning IT Security Project Quality
    3. Monitoring IT Security Project Quality
    4. Testing IT Security Project Quality (1/2)
    5. Testing IT Security Project Quality (2/2)
  13. Chapter 5: Forming the IT Security Project Team
    1. Introduction
    2. Identifying IT Security Project Team Requirements
    3. Identifying Staffing Requirements and Constraints
    4. Acquiring the Needed Staff
    5. Forming the IT Security Project Team (1/2)
    6. Forming the IT Security Project Team (2/2)
  14. Chapter 6: Planning The IT Security Project
    1. Introduction
    2. Creating the IT Security Project Work Breakdown Structure
    3. Defining Project Tasks and Sub-tasks
    4. Checking Project Scope
    5. Developing Task Details (1/2)
    6. Developing Task Details (2/2)
    7. Identifying and Working With the Critical Path
    8. Testing IT Security Project Results
    9. Budget, Schedule, Risks, and Communications (1/2)
    10. Budget, Schedule, Risks, and Communications (2/2)
  15. Chapter 7: Managing the IT Security Project
    1. Introduction
    2. Initiating the IT Security Project
    3. Monitoring and Managing IT Security Project Progress (1/2)
    4. Monitoring and Managing IT Security Project Progress (2/2)
    5. Monitoring IT Security Project Risk
    6. Managing IT Security Project Change
    7. Testing IT Security Project Results (1/2)
    8. Testing IT Security Project Results (2/2)
  16. Chapter 8: Closing Out the IT Security Project
    1. Introduction
    2. Evaluating Project Completion
    3. Closing Issues Log, Change Requests, and Error Reports
    4. Preparing for Implementation, Deployment, and Operational Transfer
    5. Reviewing Lessons Learned
    6. Documentation and Compliance Reports (1/2)
    7. Documentation and Compliance Reports (2/2)
  17. Chapter 9: Corporate IT Security Project Plan
    1. Introduction
    2. Defining Your Security Strategy
    3. Legal Standards Relevant to Corporate IT Security (1/4)
    4. Legal Standards Relevant to Corporate IT Security (2/4)
    5. Legal Standards Relevant to Corporate IT Security (3/4)
    6. Legal Standards Relevant to Corporate IT Security (4/4)
    7. Corporate IT Security Project Plan Overview
    8. Corporate Security Auditing (1/2)
    9. Corporate Security Auditing (2/2)
    10. Corporate IT Security Project Parameters (1/3)
    11. Corporate IT Security Project Parameters (2/3)
    12. Corporate IT Security Project Parameters (3/3)
    13. Project Work Breakdown Structure (1/2)
    14. Project Work Breakdown Structure (2/2)
    15. Project Risks
    16. Project Constraints
    17. Project Assumptions
    18. Project Schedule and Budget
  18. Chapter 10: General IT Security Plan
    1. Introduction
    2. IT Security Assessment and Auditing
    3. Authentication
    4. Access Control
    5. Auditing (1/2)
    6. Auditing (2/2)
    7. Attacks
    8. Assessment and Audit Report
    9. Project Plan
    10. General IT Security Project Parameters (1/2)
    11. General IT Security Project Parameters (2/2)
    12. General IT Security Project Plan (1/3)
    13. General IT Security Project Plan (2/3)
    14. General IT Security Project Plan (3/3)
  19. Chapter 11: IT Infrastructure Security Plan
    1. Introduction
    2. Infrastructure Security Assessment
    3. Project Parameters (1/3)
    4. Project Parameters (2/3)
    5. Project Parameters (3/3)
    6. Project Team
    7. Project Organization
    8. Project Work Breakdown Structure
    9. Project Risks and Mitigation Strategies
    10. Project Constraints and Assumptions
    11. Project Schedule and Budget
    12. IT Infrastructure Security Project Outline (1/2)
    13. IT Infrastructure Security Project Outline (2/2)
  20. Chapter 12: Wireless Security Project Plan
    1. Introduction
    2. Wireless Security Auditing (1/9)
    3. Wireless Security Auditing (2/9)
    4. Wireless Security Auditing (3/9)
    5. Wireless Security Auditing (4/9)
    6. Wireless Security Auditing (5/9)
    7. Wireless Security Auditing (6/9)
    8. Wireless Security Auditing (7/9)
    9. Wireless Security Auditing (8/9)
    10. Wireless Security Auditing (9/9)
    11. Wireless Security Project Parameters (1/3)
    12. Wireless Security Project Parameters (2/3)
    13. Wireless Security Project Parameters (3/3)
    14. Project Team
    15. Project Organization
    16. Project Work Breakdown Structure
    17. Project Risks
    18. Project Constraints and Assumptions
    19. Project Schedule and Budget
    20. Wireless Security Project Outline (1/2)
    21. Wireless Security Project Outline (2/2)
  21. Chapter 13: IT Operational Security Plan
    1. Introduction
    2. Operational Security Assessment (1/10)
    3. Operational Security Assessment (2/10)
    4. Operational Security Assessment (3/10)
    5. Operational Security Assessment (4/10)
    6. Operational Security Assessment (5/10)
    7. Operational Security Assessment (6/10)
    8. Operational Security Assessment (7/10)
    9. Operational Security Assessment (8/10)
    10. Operational Security Assessment (9/10)
    11. Operational Security Assessment (10/10)
    12. Project Parameters (1/3)
    13. Project Parameters (2/3)
    14. Project Parameters (3/3)
    15. Project Team
    16. Project Organization
    17. Project Work Breakdown Structure
    18. Project Risks and Mitigation Strategies
    19. Project Constraints and Assumptions
    20. Project Schedule and Budget
    21. IT Operational Security Project Outline (1/2)
    22. IT Operational Security Project Outline (2/2)
  22. Index (1/4)
  23. Index (2/4)
  24. Index (3/4)
  25. Index (4/4)

Product information

  • Title: Syngress IT Security Project Management Handbook
  • Author(s): Susan Snedaker
  • Release date: July 2006
  • Publisher(s): Syngress
  • ISBN: 9780080489773