Project Management in IT Security Exam Information

PMITS Exam Information


PMITS (212-38) Exam
Credit Towards Certification

Certified e-Business Professional

Exam Details
  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 hours
  • Test Format: Multiple choice
  • Test Delivery: Prometric Online Web site
 
 

Exam Code

The exam code varies when taken at different testing centers.
  • Prometric Prime: 212-38
  • VUE: 212-38
 
 

Skills Measured

The exam 212-38 tests PMITS candidates on the following 10 domains.

  • Components of Project Management in IT Security
  • Organizing the IT Security Project
  • Developing the IT Security Project Team
  • Planning the IT Security Project
  • Managing the IT PM
  • Building Quality into IT Security Projects
  • Closing Out the IT PM
  • Define a Corporate IT Project Plan
  • General IT Security Plan
  • IT Operational Security Plan

Test Objectives



Components of Project Management in IT Security

  • Define a project
  • Discuss the role of network security
  • List the various possible security project solutions
  • Discuss  the limitations of a security project
  • Describe the various components of corporate security project plan
  • Discuss the factors that form the basis for success of a project
  • Discuss the limitations of a project
  • What is corporate strategy and IT security
  • Discuss the importance of the influence of Corporate Culture and Policies on IT Security

Organizing the IT Security Project

  • Summarize various aspects of an IT security project team development
  • List the IT security project stakeholders
  • What are the requirement specifications of the IT security project
  • Discuss the objectives of the IT security project
  • What are the processes involved in the IT security project
  • Describe defect tracking
  • What do you understand by term “Approval Procedures”

Developing the IT Security Project Team

  • List the IT security project team requirements
  • What are the roles and responsibilities of IT security project team
  • what is required skill set of IT security project personnel
  • What is reporting
  • Discuss about legality, regulations, and cost factors for a project
  • How to identify the staffing requirements and constraints
  • What are the steps involved in hiring the staff
  • Discuss how to develop the IT project team

Planning the IT Security Project

  • Discuss the details of IT Security Project Work
  • How to break down the project in tasks and sub-tasks in the project
  • How to verify scope of the project
  • Discuss various tasks in detail
  • Discuss the limitations that degrade the quality of an  IT security project
  • List the Government or regulatory requirements for the IT security project
  • How to define the budget, schedule, risks, and communications for a project

Managing the IT PM

  • How to start with a IT security project
  • Discuss how to examine the IT security project progress
  • How to organize the  IT security project progress
  • Discuss the necessity of documentation in project management
  • How to manage the risks involved in IT security project
  • What is the role of Change Management in the IT Security project
  • How to  test the IT Security project results

Building Quality into IT Security Projects

  • How to identify the quality of  the IT security project
  • What are the user and technical requirements for improving the quality of the project
  • Discuss about quality metrics
  • What are the operational standards of the IT project
  • How to monitor IT security project quality
  • List the steps involved in testing the quality of  the IT Security Project

Closing Out the IT PM

  • How to evaluate a project for completion
  • Discuss in detail about close all open issues and change requests
  • What is an error report
  • How to prepare for implementation, deployment, and operational transfer while closing out the IT security project
  • What is a compliance report

Define a Corporate IT Project Plan

  • Define a security strategy for the IT project
  • Discuss the legal standards
  • Understand Health Insurance Portability and Accountability Act 195 Sarbanes-Oxley Act
  • Understand the laws concerning unauthorized access
  • What are the myths and facts for penetration testing
  • Discuss the overview of the corporate IT security project plan
  • What is security auditing
  • List the various reasons for security breaches
  • What are the factors of the corporate IT security project
  • Understand the risks associated with the project
  • What is infrastructure security assessment
  • Discuss the mitigation strategies of the risks involved in IT project plan

General IT Security Plan

  • What is the role of security assessment and auditing in  IT security planning
  • List the organizational resources that need to be audited
  • Discuss the different process involved in risk assessment such as  vulnerability scanning and penetration testing
  • What is the role of impact analysis in general IT security plan
  • Discuss the importance of authentication and  access control
  • Summarize the different stage of auditing
  • What are the different attacks IT security systems
  • Discuss the composition of an assessment and audit Report
  • List various entries in the finding reports
  • What are the general IT security project parameters
  • How to create a project work breakdown structure (WBS)
  • Discuss different constraints of an IT security plan
  • Explain the wireless security project plan
  • Provide guidelines for wireless security auditing
  • Types of Wireless Devices
  • List various  threats to wireless
  • Summarize various countermeasures to overcome wireless threats
  • How to develop a wireless security project outline

IT Operational Security Plan

  • What is the role of operational security assessment in an IT security project
  • Discuss incident response processes related to IT operational security plan
  • How to build a response team for operational security
  • List various operational security policies
  • Discuss disaster recovery in context of IT operational security
  • List and summarize different regulatory issues
  • Summarize the impact of Health Insurance Portability and Accountability Act,  Gramm-Leach-Bliley Act, and  Sarbanes-Oxley Act on operational security
  • Explain various operational security project parameters
  • Discuss various project risks and mitigation strategies
  • What are the different constraints and assumptions of an IT operational security project