Filter by phrase (skill, title, or position):

Catalog of Task Label Templates

Title Description Skills ManHours Focus Applied Views
  Site
Apply Cybersecurity Strategy for Systems and Applications From ranked list of cybersecurity threats and vulnerabilities for corporate systems and applications concerns, internally and externally. Create processes to monitor, log, and suggest modifications. System Verification Strategy, Systems Architecture, System Security, Software Development, Software Testing, Technology Leadership, Manage Cyber Security Threats, Attention to Detail, Unit Testing, Intuitive Problem Solving, Windows OS, iOS System, IOS Development, Android, Android App Design, Cloud Infrastructure 12000 81002 98 457 Soon Interface to Use Template to Create Task Labels
  Site
Measure Success and Utility Following System Adoption Measure how effective the system meets project objectives and future needs of the corporation. Include a longitude study. Identify decsion metrics for future use of the system and related contracts. Technology Leadership, Human Resource Management, Business Management, Managerial Finance, Managerial Accounting, capital budgeting decisions, Technical Risk Assessment, Systems Evaluation, System Verification Strategy, Evaluate Performance, Data Monitoring, Statistical Analysis, Intuitive Problem Solving, Critical Thinking 5000 46475 138 431 Soon Interface to Use Template to Create Task Labels
  Site
Conduct Feasibility Study for New App Determine cost, need, projected value and market competitiveness of a new app. Feasibility Assessments, Market Research Analysis, Quantitative Analysis, Product Strategy, Managerial Finance, Managerial Accounting, Cost Accounting, Project Coordination, Technical Writing, Research Emerging Trends, New Media Literacy, Internal Communication, Software Development 3525 3290 56 721 Soon Interface to Use Template to Create Task Labels
  Site
Build First Version of an iOS App Use prototype and database schema to build an initial version of an app to be used in TestFlight and released to an internal team for testing. Swift, IOS Development, Computational Thinking, Intuitive Problem Solving, Collaboration, App Deployment 1750 1642 289 713 Soon Interface to Use Template to Create Task Labels
  Site
Apply Cybersecurity Strategy for Databases and Data From ranked list of cybersecurity threats and vulnerabilities for databases and data, internally and externally. Create processes to monitor, log, and suggest modifications. Database Systems Knowledge, Database Security, Data Monitoring, Database Audit, Security Management Strategy, Security Incident Response, Manage Cyber Security Threats, Cloud Databases, Technology Leadership, Attention to Detail, Analytical Thinking, Digital Compliance, Ethical Compliance, Collaboration 13500 83376 102 515 Soon Interface to Use Template to Create Task Labels
  Site
Launch System Internally within a Corporation Process of releasing the system internally. At this stage, the team (installers) are confident in the system and how it will be delployed within the corporation. Systems Administration, Project Coordination, Installation, Cloud Infrastructure, Network Infrastructure, Computational Thinking, Systems Evaluation, Accountability, Attention to Detail, Database Systems Knowledge, Collaboration 7500 47282 139 459 Soon Interface to Use Template to Create Task Labels
  Site
Train Employees on Corporate Cybersecurity Strategy Create a training program to teach security protocols relevant to the corporate cybersecurity strategy. Use documents and other media for reference and contracts to establish norms and protocols. Training, Management of Personnel Resources, Attention to Detail, Organizational Development, Technology Leadership, Manage Cyber Security Threats, Articulate Technical Information, Content Management, Content Creation, Social Perceptiveness, Ethical Compliance, Digital Compliance 7500 37003 105 521 Soon Interface to Use Template to Create Task Labels
  Site
Apply Cybersecurity Strategy On Network and Cloud Infrastructure Use prioritized list of cybersecurity threats and vulnerabilities to address concerns on a network and cloud infrastructure. Create ongoing processes and protocols to monitor, log, and suggest future modifications. Network Infrastructure, Cloud Infrastructure, Cybersecurity Threat Modeling, Network Routing Protocols, Cloud Computing, Computer Architecture, Unit Testing, Process Modeling, Attention to Detail, Windows OS, Android, iOS System, Digital Compliance, Analytical Thinking, Intuitive Problem Solving 12600 68346 71 454 Soon Interface to Use Template to Create Task Labels
  Site
Identify Current and Emerging Corporate Cybersecurity Threats Investigate threats and vulnerabilities of systems and applications, networks and cloud integrations, and other related processes. Rank the results on their probability and potential impact. Technical Risk Assessment, Cybersecurity Threat Modeling, Cybersecurity Audit, Database Audit, Network Security Audit, Management of Personnel Resources, Manage Cyber Security Threats, Quantitative Analysis, Data Analysis, Cloud Computing, Digital Compliance, Analytical Thinking, Computational Thinking, Intuitive Problem Solving 12500 92270 93 500 Soon Interface to Use Template to Create Task Labels
  Site
Build First Version of an Android App Use prototype and database schema to build an initial version of an app to be used in Google Play Pre-Release and released to an internal team for testing. Java, Kotlin, C Programming, Android App Design, Android Studio, Intuitive Problem Solving, Computational Thinking, Collaboration, App Deployment 2500 2824 109 663 Soon Interface to Use Template to Create Task Labels

(Focus and Applied) Skill Points are referenced in thousands. These templates seed companies creating Task Labels for their workflow and as input to Project Labels.


Page      of 3 Next