preview

Capstone: Security and Project Management Approach

Better Essays

ITT Technical Institute
IS4799 Information systems and Cyber-security
Capstone Project
August 26, 2013
Proprietary and confidential

REQUEST FOR PROPOSAL
-------------------------------------------------

-------------------------------------------------

Table of Contents

TEMPLATE CONTENTS 3
INTRODUCTION AND BACKGROUND 3
PURPOSE OF THE REQUEST FOR PROPOSAL 3
ADMINISTRATIVE 3
TECHNICAL CONTACT 3
CONTRACTUAL CONTACT 3
DUE DATES 3
SCHEDULE OF EVENTS 3
GUIDELINES FOR PROPOSAL PREPARATION 3
PROPOSAL SUBMISSION 3
DETAILED RESPONSE REQUIREMENTS 3
EXECUTIVE SUMMARY 3
SCOPE, APPROACH, AND METHODOLOGY 3
DELIVERABLES 3
PROJECT MANAGEMENT APPROACH 3
DETAILED AND ITEMIZED PRICING 3
APPENDIX: REFERENCES 3
APPENDIX: …show more content…

Project Management Approach 5. Detailed and Itemized Pricing 6. Appendix: References 7. Appendix: Project Team Staffing 8. Appendix: Company Overview

The detailed requirements for each of the above-mentioned sections are outlined below.
DETAILED RESPONSE REQUIREMENTS
EXECUTIVE SUMMARY
The Firm is a trusted information security firm. Practices include security testing services, compliance assessments and validation, education and training, and solving complex IT security problems. Our philosophy is to deliver value with every engagement, and provide results that actionable.

SCOPE, APPROACH, AND METHODOLOGY
Include detailed testing procedures and technical expertise by phase. This section should include a description of each major type of work being requested of the vendor. All information that is provided will be held in strict confidence. The proposal should reflect each of the sections listed below (examples of the types of sections that could appear are listed below – select or modify them as appropriate):

* External Network Vulnerability Assessment and Penetration Testing * Internal Network Vulnerability Assessment and Penetration Testing * Web Application Penetration Testing * Dial-In / RAS Security Testing * DMZ or Network Architecture Designs / Reviews * Wireless Network Assessment and Penetration Testing * Virtual Infrastructure Security Assessment * Server

Get Access