Our documents are based on successfully executed projects which save you time and money.
business , o-s

Engineering Essential Characteristics – Slide Deck

February 2, 2012

Free – Document download Engineering Essential Characteristics  

Tags: , Img
business , compliances , o-s , security

Sample IT Operational Risk Management Slide Deck

February 2, 2012

 Free – Document download IT Operational Risk Management Slide Deck

Tags: , Img
business , compliances , o-s

Reference: IT Outsourcing Slide Deck

February 2, 2012

 Free – Document download IT Outsourcing Slide Deck

Tags: , Img
business , o-s

Sample – Software Installation and Maintenance Architecture

February 2, 2012

Overall Architecture This section provides information on the Software Installation and Maintenance architecture. It discusses the architecture in terms of the software deployment phases that were introduced in the preceding section. Windows 200x Software Installation and Maintenance requires Windows 200x Server, Active Directory, Group Policy, and Windows 200x Professional. ...

Tags: , Img
compliances , policies , security

Sample – Software Management Policy

February 2, 2012

Purpose Corporate licenses the use of computer software from a variety of outside companies. If Corporate does not own software or its related documentation, and unless authorized by the software vendor, does not have the right to reproduce it except for backup purposes. The unauthorized or improper use or...

Tags: , Img
business

Sample – Disaster Recovery Test

February 2, 2012

Hypothetical Disasters: Could These Happen To You? In each of the following situations, which have been adapted from actual events, you are the executive on the scene, in charge and you have total responsibility for results. There is no one “right” answer to any of these problems, and the...

Tags: , Img
compliances , networking , security

Sample – The Risk Management Worksheet Documents the Process

February 2, 2012

The process is documented using the Risk Management Worksheet.  Each step will provide general instructions as a guide through completion of the worksheet.  Since the worksheet is generic to all systems, add attachments and / or references as necessary.  Each system will have its own worksheet.  In several of...

Tags: , , Img
networking , security

Sample – Risk Assessment of the Network

February 2, 2012

A complete audit of the network described in this example would probably consist of a long and detailed process. To proceed with the audit, additional information such as physical location of the network components, users background (technical knowledge, working hours, security clearance, etc.), maintenance procedures, etc. would be required....

Tags: , Img
business , sample-it-spreadsheets , security

Sample – Assessing and Implementing Network Security

February 2, 2012

Introduction The methodology used in this example to assess the risks consists of the two following phases:   Step 1 – Define the network and identify assets In this step, the network security boundary and scope are defined and an inventory of assets is performed. We assume that information...

Tags: , Img
business , compliances , networking , security

Sample – Legacy Computer Forensic Database Collection

February 1, 2012

Free – Document download Computer Forensic Database Collection  

Tags: , Img
compliances , networking , security

PowerPoint – IT Incident Response Sample

February 1, 2012

Free PowerPoint document download IT Incident Response Slides

Tags: , Img
compliances , security

PowerPoint – Another Incident Response Slide-deck

February 1, 2012

Author unknown. Incident Response www.bestitdocuments.com

Tags: , Img
networking , security

PowerPoint – Network Forensics – Knowing What You Missed

February 1, 2012

Free PowerPoint document download Basic – Forensic Techniques for Investigating  Network Traffic overview www.bestitdocuments.com

Tags: , Img
application , compliances , security

ISO 27002 – Information Security Controls

February 1, 2012

Introduction Today, generally Corporate Information Security Controls, use the international standard ISO/IEC 27002:2005, Information technology – Security techniques – Code of practice for information security management as an organizational framework to map security controls to and from the Corporate Policy, Standards and procedure documents. Each of the Corporate Enterprise...

Tags: , , Img
business , compliances , security

Sample – Operational Risk Vendor Analysis Report Fom

February 1, 2012

IT Operational Risk considers the impact that a vendor or service provider relationship may have on Corporate’s ability to provide high quality and timely services to customers and business partners, to include data integrity and the confidentiality of company and customers and business partners information. Free – Document download...

Tags: , Img
compliances , health-care-hipaa-hitech-hitech

Sample Word – HIPAA – Health Careers and Occupations

January 30, 2012

Useful download for Identity and Access Management Consideration when setting up Role Based Access Controls. Free – Document download Health Careers and Occupations “HIAA” – Health Insurers Association of America and “AAHP” – American Association of Health Plans members.

Tags: , Img
compliances , projects

Sample Word – ISO9000 Project Management Approach

January 30, 2012

Free Word document download ISO9000 Project Management Approach www.bestitdocuments.com

Tags: , Img
business , compliances , security , visio-stencils

Sample Visio – Simple Human Resource (HR) Legal Investigation Process Flow

January 29, 2012

Visio flowchart for investigating Employee HR events. Free – Visio Document download HR Investigations Process Flow www.bestitdocuments.com

Tags: , , , Img
compliances , projects

PowerPoint – IT Requirements Management – Balancing Needs and Expectations

January 29, 2012

Free PowerPoint document download IT Requirements Management – Balancing Needs and Expectations www.bestitdocuments.com

Tags: , Img
compliances , security

PowerPoint – Electronic Evidence and Computer Forensics

January 29, 2012

PowerPoint – Author unknown Electronic Evidence and Computer Forensics

Tags: , Img
compliances , policies , sample-it-spreadsheets , security

Sample Excel – Standardized Information Gathering Questionnaire

January 29, 2012

Author unknown Standardized Information Gathering Questionnaire www.bestitdocuments.com

Tags: , , Img
compliances , policies , security

Sample Suggested – Corporate IT Policy / Standard Title and Subject Matter

January 29, 2012

The following is a list of suggested Policies and Standards that all business organizations should have. Corporate Governance Corporate Policy, Policy / Standards and Processes leadership council Firewall Policy / Standard VPN Policy / Standard Remote Connectivity Policy / Standard SCSP Monitoring Policy / Standard.doc Network Monitoring / Sniffer...

Tags: , Img
compliances , firewalls , networking , security , visio-stencils

Sample Visio – Firewall Fireproof Internet DMZ

January 29, 2012

Free – Visio Firewall Fireproof  Document download Fireproof Internet DMZ www.bestitdocuments.com

Tags: , , Img
business , compliances , itil , projects

Sample MS Project – ITIL Enterprise Change Management Process

January 29, 2012

Free – Document download Enterprise Change Management Process

Tags: , Img
compliances , security , visio-stencils

Sample Visio – HRIS to UserID Creation Process

January 29, 2012

Free – Visio Document download HRIS to UserID Creation Process www.bestitdocuments.com

Tags: , , Img
business

Sample Word – Strategic Plan for Procurement

January 29, 2012

Free Word document download Strategic Plan for Procurement www.bestitdocuments.com

Tags: , Img
compliances , security

Sample Word – Information Security: Incident Handling Procedures

January 29, 2012

Free Word document download Incident Handling Procedures www.bestitdocuments.com

Tags: , Img
compliances , projects , sample-it-spreadsheets

Sample Excel – Project Roles Responsibilties Matrix spreadsheet

January 29, 2012

Free – Document download Project Roles Responsibilties Matrix www.bestitdocuments.com

Tags: , , Img
business

Sample Word – HR Employee Perform Review Template

January 27, 2012

Free Word document download Perform Review Template

Tags: , , , Img
application , compliances , networking , security , visio-stencils , web-services

Sample Visio – Citrix Thin Client Networks

January 20, 2012

Free – Visio Document download Citrix Thin Client Networks www.bestitdocuments.com

Tags: , , , , , Img
business , compliances , networking , security , visio-stencils , web-services

Sample Visio – Network Enterprise Web Server Configuration

January 20, 2012

Free – Visio Document download Network Enterprise Web Server Configuration www.bestitdocuments.com

Tags: , , , Img