|
Task Title |
Task Description |
Skills |
Estimated ManHours |
Skill Points ℠ Focus |
Skill Points ℠ Applied |
Total Views |
||
|---|---|---|---|---|---|---|---|---|
| Apply Cybersecurity Strategy On Network and Cloud Infrastructure | Use prioritized list of cybersecurity threats and vulnerabilities to address concerns on a network and cloud infrastructure. Create ongoing processes and protocols to monitor, log, and suggest future modifications. | Process Modeling, Analytical Thinking, Cloud Infrastructure, Cloud Computing, Network Infrastructure... | 12600 | 68346 | 71 | 1198 | Soon Interface to Use Template to Create Task Labels | |
| Define Corporate Systems Cybersecurity Protocols and Goals | Clearly define a corporate cybersecurity strategy. Evaluate corporate systems. Prioritize actionable security goals and protocols. | Collaboration, Articulate Technical Information, Complex Problem Solving, Digital Compliance, Database Security... | 12500 | 69710 | 74 | 1117 | Soon Interface to Use Template to Create Task Labels | |
| Optimize System Effectiveness and Verify Security Protocols | Process of evaluating and improving a system after release. Determin key metrics. Find ways to opimize and automate aspects of the system, | System Design Strategy, Data Monitoring, Articulate Technical Information, Business Analysis, Data Interpretation... | 10000 | 79503 | 124 | 1119 | Soon Interface to Use Template to Create Task Labels | |
| Apply Cybersecurity Strategy for Systems and Applications | From ranked list of cybersecurity threats and vulnerabilities for corporate systems and applications concerns, internally and externally. Create processes to monitor, log, and suggest modifications. | IOS Development, System Security, Manage Cyber Security Threats, iOS System, Intuitive Problem Solving... | 12000 | 81002 | 98 | 1159 | Soon Interface to Use Template to Create Task Labels | |
| Apply Cybersecurity Strategy for Databases and Data | From ranked list of cybersecurity threats and vulnerabilities for databases and data, internally and externally. Create processes to monitor, log, and suggest modifications. | Database Audit, Cloud Databases, Collaboration, Security Management Strategy, Data Monitoring... | 13500 | 83376 | 102 | 1218 | Soon Interface to Use Template to Create Task Labels | |
| Create Onboarding and Training Materials for System Release | Create documentation, presentation materials and online support for the adoption of a new system. Use themes and content for each type of user and team using the system. | LMS Administration, Learning Techniques, Intuitive Problem Solving, Management of Personnel Resources, Articulate Technical Information... | 12500 | 85425 | 123 | 1210 | Soon Interface to Use Template to Create Task Labels | |
| Support System after Initial Release | Setup a support apparatus for a system within an organization. Initially antipate higher incident rates and slower adoption rates. Build metrics for continous improvement and automated support. | Research Information, Troubleshooting, Data Monitoring, Analytical Thinking, Human Resource Management... | 12500 | 87520 | 140 | 1188 | Soon Interface to Use Template to Create Task Labels | |
| Identify Current and Emerging Corporate Cybersecurity Threats | Investigate threats and vulnerabilities of systems and applications, networks and cloud integrations, and other related processes. Rank the results on their probability and potential impact. | Analytical Thinking, Intuitive Problem Solving, Database Audit, Quantitative Analysis, Digital Compliance... | 12500 | 92270 | 93 | 1208 | Soon Interface to Use Template to Create Task Labels |
(Focus and Applied) Skill Points are referenced in thousands. These templates seed companies creating Task Labels for their workflow and as input to Project Labels.
Previous
Page
of 4