1.0 Project scope 3
1.1 Objective 3
What is the objectives of the project? 3
- deliver end to end phishing campaign 3
1.2 Deliverables 3
1.3 Problem solving methodology – (PM) 3
1.4 Milestones – (PM) Gant chart 3
1.5 Statement of Work (SoW) - (PM) 3
1.6 Required Resources – 3
1.7 Client sign off 4
2.0 Project priority matrix - 5
3.0 Project deliverables – (Tech) ( expansion on 1.2) 6
4.0 Work breakdown structure (WBS) – (PM) 7
4.1 WBS diagram 7
5.0 Project A: Phishing Campaign 8
5.1 Phase 1: Target Audience 8
5.2 Phase 2: Campaign Tools Installed (Extension of 1.6) 8
5.3 Phase 3: Deployment Testing 8
The actual simulated deployment, NOT any beta testing! 8
5.4 Phase 4: Results and feedback of Campaigns 8
6.0 Schedule -(PM) 9
6.1 Time schedule 9
7.0 Staffing and resource allocation and project budget 10
7.1 Cashflow - (PM) 10
8.0 Stakeholder management 11
8.1 Stakeholders 11
9.0 Project risk planning - (PM) 12
9.1 Project risk identification 12
10.0 Staff Awareness Program (SAP) – (Tech) 13
10.1 Scope of Program 13
– to identify training requirements as needed 13
Designing a draft SAP based on results from commissioned phishing campaign 13
10.2 Types of Phishing 13
10.3 Impacts of Phishing 13
10.4 Tools to Detect Phishing 13
10.5 Business Implication of a breach. 13
11.0 Team formation and team reflection 14
11.1 Team Bio’s 14
Tom 14
John 14
Harry 14
11.2 Team goal statement 14
11.3 Reflective summaries 14
11.4 Team assessment responsibility matrix 14
12.0 Appendix 15
12.1 All email templates will also be references under Appendix 15