English
English
English

Project Management (Cybersecurity oriented)

Project Management (Cybersecurity oriented)

This module explores key project management principles tailored to cybersecurity. It covers the full project lifecycle with a focus on risk, compliance, resource planning, and secure execution. Learners will manage security constraints, lead incident response projects, and compare agile vs. traditional approaches to ensure effective, secure delivery.

This module explores key project management principles tailored to cybersecurity. It covers the full project lifecycle with a focus on risk, compliance, resource planning, and secure execution. Learners will manage security constraints, lead incident response projects, and compare agile vs. traditional approaches to ensure effective, secure delivery.

This module explores key project management principles tailored to cybersecurity. It covers the full project lifecycle with a focus on risk, compliance, resource planning, and secure execution. Learners will manage security constraints, lead incident response projects, and compare agile vs. traditional approaches to ensure effective, secure delivery.

Rated 5/5 (1 review)

Remote or e-learning

1 day duration (7h)

300€ without VAT

Created on 05/02/2025, updated on 01/03/2025

Accessible to people with disabilities*

E-learning access : 24h.
Remote access: 1 week.
Access modality : preliminary interview.

GOALS

Understand the basics of project management applied to cybersecurity

Learn to identify and manage specific cybersecurity risks

Discover methodologies adapted to IT security projects

Master the tools and techniques to effectively manage a project in cybersecurity

FOR WHOM

IT and cybersecurity professionals involved in managing or coordinating IT security projects. The participants generally have experience or basic knowledge of cybersecurity or project management.

Cybersecurity managers: responsible for defining and implementing security strategies within their organization.

IT project managers: overseeing technological initiatives, with a need to understand the specifics of cybersecurity projects.

Network and security administrators: Manage network infrastructures and security solutions

Project management or cybersecurity consultants: Supporting or auditing sensitive projects.

Developers involved in sensitive projects: Collaborating on technological solutions integrating cybersecurity requirements.

*People with disabilities who would like to take part in this training course are encouraged to contact us so that we can explore the following options together.

PREREQUISITE

Familiarity with project management concepts: prior experience with methodologies such as Agile or V-cycles is a plus, although an introduction is included in the course.

Methods used, technical and teaching resources

Trainers, learners and companies have access to a secure online space.

Face-to-face: Training rooms equipped with video projectors, flipcharts, interactive whiteboards, high-speed Wi-Fi connection, and individual workstations if required.

Distance learning: virtual classroom, instant messaging, screen sharing, interactive tools (polls, online quizzes), as well as the availability of pedagogical documents on learner platforms.

Trainers propose practical and interactive activities, such as role-playing, simulations or experiments, to help students understand and apply the concepts learned.

Trainee pedagogical resources: Participant booklet, printed supports for learners, conducive to note-taking and individual commitment.

Certification procedure

Expected results at the end of the training : a certificate of achievement is awarded on completion of the training.

Content of the course
Introduction to Cybersecurity Project Management (1h)

- Definition and role of project management in cybersecurity
- Major differences between traditional IT projects and cybersecurity projects
- The lifecycle of a security-oriented project: from key phases to integration

Introduction to Cybersecurity Project Management (1h)

- Definition and role of project management in cybersecurity
- Major differences between traditional IT projects and cybersecurity projects
- The lifecycle of a security-oriented project: from key phases to integration

Introduction to Cybersecurity Project Management (1h)

- Definition and role of project management in cybersecurity
- Major differences between traditional IT projects and cybersecurity projects
- The lifecycle of a security-oriented project: from key phases to integration

Risk identification and management (1h30)

- Typology of cybersecurity risks: technical, human, organizational
- Risk identification methods: brainstorming, cause trees
- Tools for analysis and prioritization: risk matrices and EBIOS methodology

Risk identification and management (1h30)

- Typology of cybersecurity risks: technical, human, organizational
- Risk identification methods: brainstorming, cause trees
- Tools for analysis and prioritization: risk matrices and EBIOS methodology

Risk identification and management (1h30)

- Typology of cybersecurity risks: technical, human, organizational
- Risk identification methods: brainstorming, cause trees
- Tools for analysis and prioritization: risk matrices and EBIOS methodology

Project management methodologies adapted to cybersecurity (2h)

- Traditional V-cycle and agile methodologies
- PRINCE2 and its cybersecurity-specific applications
- Using Scrum for collaborative security projects
- Case studies: example of secure migration to the cloud

Project management methodologies adapted to cybersecurity (2h)

- Traditional V-cycle and agile methodologies
- PRINCE2 and its cybersecurity-specific applications
- Using Scrum for collaborative security projects
- Case studies: example of secure migration to the cloud

Project management methodologies adapted to cybersecurity (2h)

- Traditional V-cycle and agile methodologies
- PRINCE2 and its cybersecurity-specific applications
- Using Scrum for collaborative security projects
- Case studies: example of secure migration to the cloud

Planning and Managing a Cybersecurity Project (1h30)

- Project plan: objectives, deliverables, milestones and constraints
- Monitoring and steering: management of deadlines, costs and quality
- Stakeholder communication and coordination
- Implementation of key performance indicators (KPIs) to assess progress

Planning and Managing a Cybersecurity Project (1h30)

- Project plan: objectives, deliverables, milestones and constraints
- Monitoring and steering: management of deadlines, costs and quality
- Stakeholder communication and coordination
- Implementation of key performance indicators (KPIs) to assess progress

Planning and Managing a Cybersecurity Project (1h30)

- Project plan: objectives, deliverables, milestones and constraints
- Monitoring and steering: management of deadlines, costs and quality
- Stakeholder communication and coordination
- Implementation of key performance indicators (KPIs) to assess progress

Tools and Techniques for Managing a Cybersecurity Project (30 min)

- Introduction to tools such as MS Project, Jira and Trello
- Introduction to cybersecurity-specific training platforms (CTFs, simulations)
- Integration of threat monitoring tools

Tools and Techniques for Managing a Cybersecurity Project (30 min)

- Introduction to tools such as MS Project, Jira and Trello
- Introduction to cybersecurity-specific training platforms (CTFs, simulations)
- Integration of threat monitoring tools

Tools and Techniques for Managing a Cybersecurity Project (30 min)

- Introduction to tools such as MS Project, Jira and Trello
- Introduction to cybersecurity-specific training platforms (CTFs, simulations)
- Integration of threat monitoring tools

Evaluation and multiple-choice questions (30 min)

- MCQs on the concepts covered
- Case studies to assess knowledge acquisition

Evaluation and multiple-choice questions (30 min)

- MCQs on the concepts covered
- Case studies to assess knowledge acquisition

Evaluation and multiple-choice questions (30 min)

- MCQs on the concepts covered
- Case studies to assess knowledge acquisition

Contact us for information

Contact

© 2024 • NEO Cyber Camp

Learn. Practice. Secure.

An all-in-one platform to learn and practice available 24/7 only with an internet connection, that offers you a direct path to a cybersecurity carreer.

© 2024 • NEO Cyber Camp

Learn. Practice. Secure.

An all-in-one platform to learn and practice available 24/7 only with an internet connection, that offers you a direct path to a cybersecurity carreer.

© 2024 • NEO Cyber Camp

Learn. Practice. Secure.

An all-in-one platform to learn and practice available 24/7 only with an internet connection, that offers you a direct path to a cybersecurity carreer.