National University of Sciences and Technology
Home | Back
IS-831 Information Security Project Management
Campus MCS
Programs PG
Session Summer Semester 2016
Course Title Information Security Project Management
Course Code IS-831
Credit Hours 3+0
Pre-Requisutes
Course Objectives During masters program, students go through a number of courses related to information security along with on-hand experience of using third part tools. However, they are not exposed to initiation, planning and execution of real life projects. This course will provide an opportunity to the students where they learn approach/ technique to initiate a project, take it through its life cycle till its implementation and termination.
Detail Content
  1. Information security project management building blocks Corporate security project plan components, The true Cost of Security Project Success Factors, Project Constraints, Corporate Strategy and Information Security
  2. Defining the information security project Defining the Security Problem, Defining the outcome, Defining Potential Information Security Project Solutions, Defining the Optimal Security Project Solution, Applying Security project Constraints, Developing the Security Project proposal, Identification the Security project Sponsor
  3. Organizing the information security project Identification the Information Security project team, Identification the Information Security project Stakeholders, Identification the Information Security project Requirements, Identification the Information Security project objectives
  4. Building quality into information security project processes Forming Information security project team, Planning Information Security Project Quality, Monitoring Information Security Project Quality, Testing Information Security Project Quality
  5. Planning the information security project Identification Information Security project Team Requirements, Role and Responsibilities, Identifying Staffing Requirements and Constraints, Acquiring the Needed Staff, Forming the IT Security project Team, Forming the Information Security Projects Team
  6. Managing the information security project Creating the Information Security project Work Breakdown, Defining project tasks and Sub-Tasks, Checking Project Scope, Developing Task details, Identification and Working With the Critical path, Testing Information Security Project Results, Budget, Schedule, Risks, and Communications
Text/Ref Books
  1. Using the Common Criteria for IT Security Evaluation by Debra S. Herrmann, Auerbach Publications, 2002.
  2. Auditor's Guide to Information Systems Auditing, Richard E. Cascarino, John Wiley 2007.
  3. Auditing Information Systems by Jack J. Champlain, Wiley 2003, second edition.
  1. The Orange Book (DoDD 5200.28-STD)
  2. Aggressive Network Self-Defense by Neil R. Wyler, Bruce Potter, Chris Hurley
  3. “Meta sploit: The Penetration Tester's” by David Kennedy by(Author), Jim O'Gorman B005DTOK04 , (Author), Devon Kearns , (Author), MatiAharoni (Author)
  4. “The Shell coder's Handbook: Discovering and Exploiting Security Holes” by Chris Anley, John Heasman , Felix Linder.
  5. Web Application Vulnerabilities: Detect, Exploit, Prevent by Steven Palmer
Time Schedule Summer Semester 2015
Faculty/Resource Person Lec Waleed Bin Shahid, MS
National University of Science and Technology, Islamabad
Discipline: Information Security
Specialization: Information Security