|
Task Title |
Task Description |
Skills |
Estimated ManHours |
Skill Points ℠ Focus |
Skill Points ℠ Applied |
Total Views |
||
|---|---|---|---|---|---|---|---|---|
| Apply Cybersecurity Strategy On Network and Cloud Infrastructure | Use prioritized list of cybersecurity threats and vulnerabilities to address concerns on a network and cloud infrastructure. Create ongoing processes and protocols to monitor, log, and suggest future modifications. | Network Infrastructure, Analytical Thinking, Cloud Computing, Digital Compliance, Cybersecurity Threat Modeling... | 12600 | 68346 | 71 | 1217 | Soon Interface to Use Template to Create Task Labels | |
| Define Corporate Systems Cybersecurity Protocols and Goals | Clearly define a corporate cybersecurity strategy. Evaluate corporate systems. Prioritize actionable security goals and protocols. | Computational Thinking, Systems Architecture, Database Security, Collaboration, Cybersecurity Threat Modeling... | 12500 | 69710 | 74 | 1133 | Soon Interface to Use Template to Create Task Labels | |
| Optimize System Effectiveness and Verify Security Protocols | Process of evaluating and improving a system after release. Determin key metrics. Find ways to opimize and automate aspects of the system, | Articulate Technical Information, Statistical Analysis, System Design Strategy, Analytical Thinking, Business Analysis... | 10000 | 79503 | 124 | 1136 | Soon Interface to Use Template to Create Task Labels | |
| Apply Cybersecurity Strategy for Systems and Applications | From ranked list of cybersecurity threats and vulnerabilities for corporate systems and applications concerns, internally and externally. Create processes to monitor, log, and suggest modifications. | System Security, Intuitive Problem Solving, Android App Design, System Verification Strategy, iOS System... | 12000 | 81002 | 98 | 1181 | Soon Interface to Use Template to Create Task Labels | |
| Apply Cybersecurity Strategy for Databases and Data | From ranked list of cybersecurity threats and vulnerabilities for databases and data, internally and externally. Create processes to monitor, log, and suggest modifications. | Cloud Databases, Database Systems Knowledge, Technology Leadership, Ethical Compliance, Manage Cyber Security Threats... | 13500 | 83376 | 102 | 1238 | Soon Interface to Use Template to Create Task Labels | |
| Create Onboarding and Training Materials for System Release | Create documentation, presentation materials and online support for the adoption of a new system. Use themes and content for each type of user and team using the system. | Leadership, Management of Personnel Resources, Presentations, Visual Design, LMS Administration... | 12500 | 85425 | 123 | 1225 | Soon Interface to Use Template to Create Task Labels | |
| Support System after Initial Release | Setup a support apparatus for a system within an organization. Initially antipate higher incident rates and slower adoption rates. Build metrics for continous improvement and automated support. | Research Information, Technical Writing, Attention to Detail, Human Resource Management, Security Incident Response... | 12500 | 87520 | 140 | 1209 | Soon Interface to Use Template to Create Task Labels | |
| Identify Current and Emerging Corporate Cybersecurity Threats | Investigate threats and vulnerabilities of systems and applications, networks and cloud integrations, and other related processes. Rank the results on their probability and potential impact. | Management of Personnel Resources, Data Analysis, Digital Compliance, Quantitative Analysis, Computational Thinking... | 12500 | 92270 | 93 | 1229 | Soon Interface to Use Template to Create Task Labels |
(Focus and Applied) Skill Points are referenced in thousands. These templates seed companies creating Task Labels for their workflow and as input to Project Labels.
Previous
Page
of 4