Title | Description | Skills | ManHours | Focus | Applied | Views | ||
---|---|---|---|---|---|---|---|---|
Apply Cybersecurity Strategy for Databases and Data | From ranked list of cybersecurity threats and vulnerabilities for databases and data, internally and externally. Create processes to monitor, log, and suggest modifications. | Database Systems Knowledge, Database Security, Data Monitoring, Database Audit, Security Management Strategy, Security Incident Response, Manage Cyber Security Threats, Cloud Databases, Technology Leadership, Attention to Detail, Analytical Thinking, Digital Compliance, Ethical Compliance, Collaboration | 13500 | 83376 | 102 | 92 | Soon Interface to Use Template to Create Task Labels | |
Build First Version of an Android App | Use prototype and database schema to build an initial version of an app to be used in Google Play Pre-Release and released to an internal team for testing. | Java, Kotlin, C Programming, Android App Design, Android Studio, Intuitive Problem Solving, Computational Thinking, Collaboration, App Deployment | 2500 | 2824 | 109 | 270 | Soon Interface to Use Template to Create Task Labels | |
Pilot New System Release with Monitoring and Metrics | Create an initial sample group to pilot the new system release Closely monitor and measure their usage with feedback loops. Calibarate setting and security protocols in anticipation of larger release. | Project Management, Quality Control Analysis, Quantitative Analysis, Analytical Thinking, Intuitive Problem Solving, Troubleshooting, Management of Personnel Resources, Systems Administration, Internal Communication, Statistical Analysis, Process Modeling, Technical Support, Human Resource Management, Information Security Management | 10000 | 51683 | 157 | 99 | Soon Interface to Use Template to Create Task Labels | |
Create Onboarding and Training Materials for System Release | Create documentation, presentation materials and online support for the adoption of a new system. Use themes and content for each type of user and team using the system. | Documentation, Visual Design, Presentations, Management of Personnel Resources, Creative Thinking, Content Creation, Content Management, Training, Intuitive Problem Solving, Learning Techniques, Learning Strategies, Create Lesson Plans, Articulate Technical Information, Project Management, LMS Administration, Human Resource Management, Leadership | 12500 | 85425 | 123 | 95 | Soon Interface to Use Template to Create Task Labels | |
Launch System Internally within a Corporation | Process of releasing the system internally. At this stage, the team (installers) are confident in the system and how it will be delployed within the corporation. | Systems Administration, Project Coordination, Installation, Cloud Infrastructure, Network Infrastructure, Computational Thinking, Systems Evaluation, Accountability, Attention to Detail, Database Systems Knowledge, Collaboration | 7500 | 47282 | 139 | 90 | Soon Interface to Use Template to Create Task Labels | |
Train Employees on Corporate Cybersecurity Strategy | Create a training program to teach security protocols relevant to the corporate cybersecurity strategy. Use documents and other media for reference and contracts to establish norms and protocols. | Training, Management of Personnel Resources, Attention to Detail, Organizational Development, Technology Leadership, Manage Cyber Security Threats, Articulate Technical Information, Content Management, Content Creation, Social Perceptiveness, Ethical Compliance, Digital Compliance | 7500 | 37003 | 105 | 88 | Soon Interface to Use Template to Create Task Labels | |
Create Database and Modeling for App | Build database and related modeling for a App | Data interpretation, Data Visualization, Database Design, SQL Programming, MS SQL Server, Analytical Thinking, Intuitive Problem Solving, Quality Control Analysis, Collaboration | 1500 | 1308 | 115 | 289 | Soon Interface to Use Template to Create Task Labels | |
Create Cybersecurity Monitoring, Logging, and Incident Reporting for Security Threats | Provide way to monitor identified threats and vulnerabilities. Log factors influencing them. Collect and report incidents. Find opportunities to automate. | Technical Support, Troubleshooting, Security Incident Response, Internal Communication, Cataloging, Attention to Detail, Data Monitoring, Documentation, Metadata Schema, Database Design, Cloud Computing, Machine Learning, Collaboration | 7500 | 32992 | 116 | 96 | Soon Interface to Use Template to Create Task Labels | |
Apply Cybersecurity Strategy On Network and Cloud Infrastructure | Use prioritized list of cybersecurity threats and vulnerabilities to address concerns on a network and cloud infrastructure. Create ongoing processes and protocols to monitor, log, and suggest future modifications. | Network Infrastructure, Cloud Infrastructure, Cybersecurity Threat Modeling, Network Routing Protocols, Cloud Computing, Computer Architecture, Unit Testing, Process Modeling, Attention to Detail, Windows OS, Android, iOS System, Digital Compliance, Analytical Thinking, Intuitive Problem Solving | 12600 | 68346 | 71 | 91 | Soon Interface to Use Template to Create Task Labels | |
Optimize System Effectiveness and Verify Security Protocols | Process of evaluating and improving a system after release. Determin key metrics. Find ways to opimize and automate aspects of the system, | Systems Evaluation, System Design Strategy, Human Resource Management, Quantitative Analysis, Statistical Analysis, Data Analysis, Data Interpretation, Data Monitoring, Analytical Thinking, Security Management Strategy, Business Operations, Business Analysis, Articulate Technical Information, Continuous Improvement | 10000 | 79503 | 124 | 79 | Soon Interface to Use Template to Create Task Labels |
(Focus and Applied) Skill Points are referenced in thousands. These templates seed companies creating Task Labels for their workflow and as input to Project Labels.
Page 2 of 3 123