Introduction and defining the msitm capstone course requirements
1. Introduction and Defining the MSITM Capstone Course
Requirements
As you know, the purpose of an SLP is to give you the
opportunity to explore the applicability of the course learning to
your own work-life. By this time, most MSITM students are
assumed to have acquired a good deal of important knowledge
about information technology and its management.
Interestingly, you have likely also functioned (formally or
informally) in the role of 'internal organizational IT consultant'
(or can at least imagine what this might be like). Those of you
who have been (or are) IT consultants or contractors (or simply
just had to offer IT or other advice) certainly know that, in
addition to technical knowledge and skill, you also have to
acquire a set of successful ‘consulting techniques', to include a
set of suitable interaction/communication/political behaviors.
You also have to know something about the organization and
your customers, how to get at the data/issues, then get your
message across, getting people to trust and respect you and a
host of other things necessary to get the consulting role and
keep it, or to get and keep an important IT project moving. This
is only a little less true for the internal IT specialist or manager
who must respond in many ways as a consultant to internal
customers.
The SLP question thus is:
"What do I really know about my personal ‘consulting'
activities?"
Your task for this SLP is to: (1) do a little personal literature
mining (properly cited) on the particulars and importance of the
role of the IT consultant and the IT unit as a consultant to the
organization. You are encouraged to look beyond personal
2. behaviors and check out 'organization development' (OD) or
general consulting literature to understand organizational
techniques (i.e., 'scanning') and issues (such as political
realities). In particular, you might wish to find one of the
several 'step' models which suggest phased consulting activities;
(2) note some truly important characteristics; and then (3) using
this information as a guide, suggest your current most important
consulting strengths as well as opportunities you see for
improvement, based on both personal knowledge and your
assignment literature review. Relate these strengths to the
organizational unit for your project and discuss how the
strength could benefit the IT outreach from that unit. Try to do
this in three to four pages or so. (There is no penalty for a
longer paper.) Note that you may wish to seek the opinions of
co-workers in this largely self-diagnostic project. They may
have some interesting insight for you. Remember, this is not a
paper where you make generalized comments about what
consultants do. It is about your insight and typical activities. Do
not discuss personality 'traits' or 'style labels' you may have
learned. You must discuss actual activities you now use when
dealing with others and providing expert IT advice. For
example, how well do you listen versus talk, or how well do you
scan the organizational environment and try to find out about
the politics of a given situation before you wade in with your
advice or start a project? As noted above, you will wish to
research the Web and check out traditional models of consulting
behavior and typical behaviors in each 'stage.' For example,
what are effective behaviors when one first enters any kind of
consulting relationship? Again, stay out of the personality and
trait literature; this is about observable activity. You may want
to chat with people whom you have provided advice to, to see
what they have observed. Be forewarned that generalized papers
with no personal information, or including a 'personality
assessment' will be graded as unresponsive to this assignment.
Do not provide a technical outline or project details such as:
"conduct project/needs analysis." This is assumed.
3. Background Required Readings:
IT Governance Plan
Guide to Preparing an IT Governance Plan:
ISACAhttps://www.isaca.org/Certification/CGEIT-Certified-in-
the-Governance-of-Enterprise-IT/Prepare-for-the-Exam/Study-
Materials/Documents/Developing-a-Successful-Governance-
Strategy.pdf
Lectures on IT Governance
https://www.youtube.com/watch?v=cU8iGQ5hUQQ&list=PLpO
pdfLqna0v-4DYXQHUsELjWssH00-
1ihttps://www.youtube.com/watch?v=cU8iGQ5hUQQ&list=PLp
OpdfLqna0v-4DYXQHUsELjWssH00-1i&index=2
IT Governance: A Wholistic
Viewhttps://www.youtube.com/watch?v=zISRWFAM5FM
ITIL Service Lifecycle for Aligning with the Business
Needshttps://www.youtube.com/watch?v=NrfYljubKrU
ITIL – IT Infrastructure Library – set of best practices for
adding value to
customers.https://www.youtube.com/watch?v=8RqX3kcCRbM
ITIL and Service
Managementhttps://www.youtube.com/watch?v=rye6SDItzBY
Securing the Enterprise
Use this Library Guide to learn how to use the Trident Online
Library.
Soper, Daniel (2017). Information Privacy and Security.
Security Lesson #1. Introduction to Computer Security
https://www.youtube.com/watch?v=zBFB34YGK1U
Soper, Daniel (2017). Information Privacy and Security Lesson
#2 Identification and Authentication.
https://www.youtube.com/watch?v=pZIlaWhfhpQ&list=PLlYw7
4. XsK0HV-r0T5fypBv9-a1gbq8xkZR&index=2
Soper, Daniel (2017). Information Privacy and Security.
Security Lesson #3 Software Program Security
https://www.youtube.com/watch?v=AeFyCGpclwY&list=PLlYw
7XsK0HV-r0T5fypBv9-a1gbq8xkZR&index=3
Soper, Daniel (2017). Information Privacy and Security.
Security Lesson #4 Malicious Code – Malware
https://www.youtube.com/watch?v=wn-
uVP8HncA&list=PLlYw7XsK0HV-r0T5fypBv9-
a1gbq8xkZR&index=4
Soper, Daniel (2017). Information Privacy and Security.
Security Lesson #5 - Illicit Data Interception and Access
https://www.youtube.com/watch?v=F_obVu9HknQ&list=PLlYw
7XsK0HV-r0T5fypBv9-a1gbq8xkZR&index=5
Business Continuity and Disaster
Recoveryhttps://www.youtube.com/watch?v=W3GdGemRGXo
Business Continuity Planning and Disaster
Recoveryhttps://www.youtube.com/watch?v=vGND4tvzVYg
Developing a Disaster Recovery and Business
Plan.https://www.youtube.com/watch?v=gQCTkX4M3VY
Data Governance
Data Governance
Strategieshttps://www.youtube.com/watch?v=ASoi9GIre5I
Journey and Roadmap to a Data Governance
Programhttps://www.youtube.com/watch?v=oTd9RwblaD4
Master Data Managementhttps://www.youtube.com/watch?v=g9-
lLrUSRJY
Design and Implementation of a Security
Architecturehttps://www.youtube.com/watch?v=LDQxzz42Bs0
COBIT5 – Business framework for governance and management
of the
enterprisehttps://www.youtube.com/watch?v=VaGSmJ21hlEhttp
s://www.youtube.com/watch?v=PEqtgFZ4Pfohttps://www.youtu
be.com/watch?v=U24cmu-JiWY
TOGAF – Architecting IT – ITIL and
Cobithttps://www.youtube.com/watch?v=eu zTVDn8wmc