Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Gantt Charts

Critical Path

The longest sequence of activities in a project that must be completed to be on time.

Slippage

What has actually happened compared with what should have happened.

  • What if there are two critical paths?
  • What if you have tasks that you want to overlap?

Granulate a Task

Cut it into smaller parts.

Task Link

  • Finish - Start
  • Start - Start
  • Finish - Finish
  • Start - Finish

image-20241107201604080

image-20241107201655400

  • Spread the contingency through your critical path, adding a little bit to each task.
    • Network Diagram - Gantt Charts
  • Risks in Your Gantt Chart
    • If there are much 1 day work, it will never happen in real world
    • If floating task nearly critical, should pay attention
    • Too much short tasks at the end(need to add time)

Granularity

The degree to which tasks are broken down

  • Double-check the connections between tasks as you progress.
  • Does the network diagram look right?

Check Your Plan

  • Too many tasks? (30+)
  • Any task larger than the others?
  • Any flurry of small tasks at the end?
  • A good mix of series and parallel?

Putting in and positioning the floating tasks

Floating Tasks

  • Add vertical lines
  • Okay to share a float
  • Floaters may depend on other floaters.
  • Decide to float earlier or later
  • Neater is easier to understand

Assessing the software options

Microsofe Excel

  • Sharing
  • Adding up costs and time
  • Planning resources for multiple projects

How to leverage a Gantt Chart

Before I promise anything, I need to do a bit of planning, which I think you'll agree, is a reasonable thing to do.

Kickoff meeting

  • See roles
  • Commit to responsibilities

Verify Commitments

Two steps

  • What we're going to plan
  • sign off on the plan

Using a Gantt chart to plan resources for one project

Units of Measure for Resource Plan

  • Hours per week
  • Person days per week or month
  • Number of people(FTEs) per week/month

Gantt of Gantts

image-20241107213001304

Resource Planning

Network diagram

image-20241107213344651

image-20241107213438886

  • Identify bottleneck resources
  • Look at time and projects

image-20241107215510629

Monitoring progress with a Gantt chart

image-20241107215613525

Assessing risk with a Gantt Chart

Risk

  • Lateness
  • Overspend
    • consider the cost risks of all tasks

Speeding up your project with Gantt Chart

Speed up: First Half

  • Increase resources
  • Reduce quality
  • Overlap tasks

Crashing the Project

  • Increase resources
  • Reduce quality
  • Overlap tasks

Speed up: Second Half

  • Increase resources
  • Reduce quality
  • Overlap tasks
  • Let it slip

Only reschedule once.

Ask for more than a repeat of the first half.

Forecasting spend with a Gantt chart

Predicting Spend

Forecasting Challenge

Forecast Cost at Completion(FCC)

An estimate of the project's final cost

Challenge

  • Estimate the final cost
  • Predict the date of completion

Forecasting Solution

Optimist View

Pessimist View

Five common mistake

  1. Jumping straight to the Gantt Chart
  2. Getting the wrong level of granularity
  3. Forgetting Contingency
  4. Neglecting the Gantt chart once you've started
  5. Changing your plan more than once

Course

  • Project Management Simplified
  • Project Management: Solving Common Project Problems
Last Updated:
Prev
Resource
Next
Intrduction