REQUIRED ACTIONS:
Research the internet and select a Request for Proposal (RFP) related to your area of information technology expertise. Areas of expertise include Cybersecurity, IT Security, IT Project Management, Information Security, Management, Business Analytics, Business Administration, Software Development, Database. Many federal, state, city and counties have current RFP’s. RFP’s are used by entities to request proposals for work that will be done inhouse by an outside vendor or company.
Assume that you have submitted a proposal and that your company (an outside vendor) has won the bid and will do the work. You have been awarded a time and materials contract. For the RFP you select – you will estimate one time and reoccurring costs.
Your next task will be to develop a project charter using the information from your selected RFP. Over the course of the next several weeks, you will use this as a basis for developing other project management deliverables.
The project charter must contain the following:
- Project title
- Purpose
- Description
- Scope statement
- Objectives
- Success criteria or expected benefits
- Major deliverables
- Acceptance criteria
- Milestone schedule
- Key assumptions
- Constraints
- Major risks
Desktop Lab Project: (Click here to explore)
Desktop Lab Project:
Your company will be responsible for retrofitting three 20 seat rooms of PCs for students at a university new computer lab. In addition to the PCs, each lab will also need to have three ‘smart TVs’ to aid in collaboration and to enhance the learning environment. Security of the lab assets is essential. Since you are planning this, you have the latitude to the scope and plan the project. However, there are some priority must-have requirements to balance the usability and potential cyber-risks of this learning environment:
All computers connected to the network must have an authentication mechanism that adheres to the University Account and Password Guidelines and uniquely identifies the user of the computer for each session. Before using the lab computer, each user will be required to authenticate via the campus Active Directory domain structure with a unique user ID and password credentials which comply with the campus standard. In addition, some method of session time out must be enabled for the user accounts, and a method of logging must be implemented. In order to prevent the installation of malicious applications or key-logging software, you must implement steps to prevent malicious code and key-loggers from being installed and executed on the computers and ensure security updates are continually installed and all connected devices in the computer labs are monitored for security threats. All computer lab devices should be physically secured, or access to the lab should be secured through whatever means are fiscally available – make at least two recommendations for the physical security aspects of the computer labs.
CONTENT FOLDER RFP’s FOR INDIVIDUAL PROJECT (Click here to explore)
CONTENT FOLDER RFP’s FOR INDIVIDUAL PROJECT
- City of Seattle RFP# SPD-3289
- WorkForce Intelligence Network – Web Development and Maintenance
- Empire State Development – RFP NYSTAR 2018 Cybersecurity Services
- Warren County R-III School District RFP Cyber Security Audit
- Fremont County – Redesign, Development, and Hosting of the Fremont County, WY, Government Website
- Kansas Department of Administration – RFP Event and Venue Management Database Software
- Division Of Information Systems and Telecommunications (DIST) – RFP/2018/1077