Work on your project milestone 1 and report your evidence to support that the milestone was completed.
Submit a 2-page status report that includes your evaluation of theories, principles, and best practices surrounding cybersecurity and your project.
This should include recent strategies for cybersecurity defenses. Also, describe the tasks completed in this milestone in an updated work breakdown structure (WBS), in Excel®, Word, or Project®, showing the actual time it took to complete each task. Finally, describe lessons learned while implementing this milestone. In addition, demonstrate that the milestone is fully completed by showing sufficient evidence. Depending on the project, the evidence can take the form of research findings, diagrams, designs, screenshots, databases, queries, source code, configurations, videos, policies, etc. Your evidence should result in at least 5 pages. This is in addition to your 2-page status report. If your evidence is in the form of videos, the videos should be at least 8–10 minutes long. This is only for your evidence.
Please see milestone below:
Milestone 1: Project Launch
The first phase focuses on the project's initiation phase through planning and consulting with the stakeholders involved. This phase will initiate meetings to assess and describe the security vulnerabilities in the currently deployed endpoint architecture (Chandel et al., 2019). Each project shall have a clear charter, including the specific deliverables, goals, and expected results. The planning phase will also involve the development of a work schedule and responsibilities, as well as measures of checking the accomplishments made during its execution. This way, all the key stakeholders are on the same page regarding implementing the envisaged project, creating a platform for effective and efficient implementation.