Title | Description | Skills | ManHours | Focus | Applied | Views | ||
---|---|---|---|---|---|---|---|---|
Apply Cybersecurity Strategy On Network and Cloud Infrastructure | Use prioritized list of cybersecurity threats and vulnerabilities to address concerns on a network and cloud infrastructure. Create ongoing processes and protocols to monitor, log, and suggest future modifications. | Network Infrastructure, Cloud Infrastructure, Cybersecurity Threat Modeling, Network Routing Protocols, Cloud Computing, Computer Architecture, Unit Testing, Process Modeling, Attention to Detail, Windows OS, Android, iOS System, Digital Compliance, Analytical Thinking, Intuitive Problem Solving | 12600 | 68346 | 71 | 147 | Soon Interface to Use Template to Create Task Labels | |
Identify Current and Emerging Corporate Cybersecurity Threats | Investigate threats and vulnerabilities of systems and applications, networks and cloud integrations, and other related processes. Rank the results on their probability and potential impact. | Technical Risk Assessment, Cybersecurity Threat Modeling, Cybersecurity Audit, Database Audit, Network Security Audit, Management of Personnel Resources, Manage Cyber Security Threats, Quantitative Analysis, Data Analysis, Cloud Computing, Digital Compliance, Analytical Thinking, Computational Thinking, Intuitive Problem Solving | 12500 | 92270 | 93 | 163 | Soon Interface to Use Template to Create Task Labels |
(Focus and Applied) Skill Points are referenced in thousands. These templates seed companies creating Task Labels for their workflow and as input to Project Labels.
Page 3 of 3 123