Cyber Security Project Management
A thorough course on the stages involved in managing complex cybersecurity projects.
40 hours
Management and Awarenesss
40 hours
Management and Awarenesss

ABOUT THE PROGRAM

Cybersecurity has become a key issue for businesses, with many organizations looking to protect their data and information from sophisticated potential threats. The need for project management skills within the cybersecurity world has become a priority and a must for implementing innovative and effective defense systems strategies.    
Accurate and well-implemented management practices are proven to lead to more effective projects with a smarter use of resources and improved timeframes. Good project management leads to risk reduction and increased success rates.
CYBERPRO’s Cyber Security Project Management course provides Project Management professionals who want to delve into the world of cybersecurity with the appropriate skills to push for more streamlined and successful projects. PMs will deep-dive into the tools and techniques to implement and monitor cybersecurity strategies. All trainees will learn how to align the interests of their team, and push for better cybersecurity results.

The course covers the following topics:

DON'T TOUCH THIS TAB

It’s important to improve the accordion’s behaviour

Intro to Project Management
  • The role of cybersecurity in project management
  • Building up a project
  • Defining the security plan for a project
  • Limitations and success metrics for a project
  • Determining the feasibility of the security plan and project
Intro to IT Security Projects
  • The role of stakeholders in PMITS
  • IT Security projects: objectives, requirements, and processes
  • About Issue tracking and management systems
  • Approval filters and processes
  • Building the best IT Security Project Team
Project Planning
  • The scope of the IT security project planning
  • The logic behind branching out activities and tasks
  • Determining budget, schedule, and risks
  • Adding streams and depreciating streams
Project Management
  • Performance metrics
  • Organizing and presenting data
  • IT Security Project Documentation
  • Introduction to risk management
  • Introduction to change management
  • Testing units and sessions
  • Quality Control for Projects
Closing the IT security project
  • IT Security Project Closure: Overview
  • Preparing closure statements and reports
  • Prepare compliance reports
Project Monitoring and Control
  • The project monitoring strategy
  • Intro to Penetration Testing
  • Intro to Security Audits
  • Understanding risks and vulnerabilities for IT security
  • Infrastructure security assessment
  • Preparing mitigation strategies
Don't touch this tab
ABOUT CYBERPRO

About CYBERPRO was founded in cooperation with international information security and instruction authorities who bring to Israel world-leading cyber training technologies and a learning experience of the highest standard available today.

The partners include the IITC group which has been training graduates for the high tech industry for over 20 years, and was selected as the training center for the Cisco Company in Israel.

CYBERPRO’s advanced, sought-after training courses in the areas of infrastructures, information security and cyber are world famous. These training courses were developed by some of the best cyber experts in the world, for international security organizations that emphasize the high training capabilities, the professional learning methods and the unique training and practice technologies. Our connection with international groups allows our students to be exposed to unique employment opportunities in Israel and abroad.

The training and learning tracks are all based much hands-on practice and preparation for the industry and profession requirements, so they include technological labs and practice sessions using one of the most advanced simulators in the world.

COURSE INFO
    • Security project managers
    • Systems designers and engineers
    • Security managers
    • Security consultants
    • Practical experience in managing software or infrastructure project
    • Good familiarity with the cyber-security domain
    • Ability to manage complex cyber-security projects
    • Oversee cyber-security projects

INTERESTED? CONTACT US