Gerardus Blokdyk

Capability Security A Complete Guide - 2020 Edition


Скачать книгу

the Capability Security Scorecard on the second next page of the Self-Assessment.

      Your completed Capability Security Scorecard will give you a clear presentation of which Capability Security areas need attention.

      Capability Security

      Scorecard Example

      Example of how the finalized Scorecard can look like:

      Capability Security

      Scorecard

      Your Scores:

      BEGINNING OF THE

      SELF-ASSESSMENT:

      Table of Contents

      About The Art of Service7

      Included Resources - how to access7

      Purpose of this Self-Assessment9

      How to use the Self-Assessment10

      Capability Security

      Scorecard Example12

      Capability Security

      Scorecard13

      BEGINNING OF THE

      SELF-ASSESSMENT:14

      CRITERION #1: RECOGNIZE15

      CRITERION #2: DEFINE:27

      CRITERION #3: MEASURE:43

      CRITERION #4: ANALYZE:58

      CRITERION #5: IMPROVE:73

      CRITERION #6: CONTROL:89

      CRITERION #7: SUSTAIN:101

      Capability Security and Managing Projects, Criteria for Project Managers:126

      1.0 Initiating Process Group: Capability Security127

      1.1 Project Charter: Capability Security129

      1.2 Stakeholder Register: Capability Security131

      1.3 Stakeholder Analysis Matrix: Capability Security132

      2.0 Planning Process Group: Capability Security134

      2.1 Project Management Plan: Capability Security136

      2.2 Scope Management Plan: Capability Security138

      2.3 Requirements Management Plan: Capability Security140

      2.4 Requirements Documentation: Capability Security142

      2.5 Requirements Traceability Matrix: Capability Security144

      2.6 Project Scope Statement: Capability Security146

      2.7 Assumption and Constraint Log: Capability Security148

      2.8 Work Breakdown Structure: Capability Security150

      2.9 WBS Dictionary: Capability Security152

      2.10 Schedule Management Plan: Capability Security155

      2.11 Activity List: Capability Security157

      2.12 Activity Attributes: Capability Security159

      2.13 Milestone List: Capability Security161

      2.14 Network Diagram: Capability Security163

      2.15 Activity Resource Requirements: Capability Security165

      2.16 Resource Breakdown Structure: Capability Security166

      2.17 Activity Duration Estimates: Capability Security168

      2.18 Duration Estimating Worksheet: Capability Security170

      2.19 Project Schedule: Capability Security172

      2.20 Cost Management Plan: Capability Security174

      2.21 Activity Cost Estimates: Capability Security176

      2.22 Cost Estimating Worksheet: Capability Security178

      2.23 Cost Baseline: Capability Security180

      2.24 Quality Management Plan: Capability Security182

      2.25 Quality Metrics: Capability Security184

      2.26 Process Improvement Plan: Capability Security186

      2.27 Responsibility Assignment Matrix: Capability Security188

      2.28 Roles and Responsibilities: Capability Security190

      2.29 Human Resource Management Plan: Capability Security192

      2.30 Communications Management Plan: Capability Security194

      2.31 Risk Management Plan: Capability Security196

      2.32 Risk Register: Capability Security198

      2.33 Probability and Impact Assessment: Capability Security200

      2.34 Probability and Impact Matrix: Capability Security202

      2.35 Risk Data Sheet: Capability Security204

      2.36 Procurement Management Plan: Capability Security206

      2.37 Source Selection Criteria: Capability Security208

      2.38 Stakeholder Management Plan: Capability Security210

      2.39 Change Management Plan: Capability Security212

      3.0 Executing Process Group: Capability Security214

      3.1 Team Member Status Report: Capability Security216

      3.2 Change Request: Capability Security218

      3.3 Change Log: Capability Security220

      3.4 Decision Log: Capability Security222

      3.5 Quality Audit: Capability Security224

      3.6 Team Directory: Capability Security227

      3.7 Team Operating Agreement: Capability Security229

      3.8 Team Performance Assessment: Capability Security231

      3.9 Team Member Performance Assessment: Capability Security233

      3.10 Issue Log: Capability Security235

      4.0 Monitoring and Controlling Process Group: Capability Security237

      4.1 Project Performance Report: Capability Security239

      4.2 Variance Analysis: Capability Security241

      4.3 Earned Value Status: Capability Security243

      4.4 Risk Audit: Capability Security245

      4.5 Contractor Status Report: Capability Security247

      4.6 Formal Acceptance: Capability Security249

      5.0 Closing Process Group: Capability Security251

      5.1 Procurement Audit: Capability Security253

      5.2 Contract Close-Out: Capability Security256

      5.3 Project or Phase Close-Out: Capability Security258

      5.4 Lessons Learned: Capability Security260

      Index262

      CRITERION #1: RECOGNIZE

      INTENT: Be aware of the need for change. Recognize that there is an unfavorable variation, problem or symptom.

      In my belief, the answer to this question is clearly defined:

      5 Strongly Agree

      4 Agree

      3 Neutral

      2 Disagree

      1 Strongly Disagree

      1. What would happen if Capability security weren’t done?

      <--- Score

      2.