Question
Please read below case study, examine pictures of WBS, Timeline, budget provide answers to the task. Human resources & recruitment, Individual & family services BEing
Please read below case study, examine pictures of WBS, Timeline, budget provide answers to the task.
Human resources & recruitment, Individual & family services
BEing U Coaching, led by Martina, is a professional career and entrepreneurial coaching service centered around empowering individuals through personalized 1-1 and group coaching experiences. Embracing a reciprocal commitment model, Martina guides career change and entrepreneurial clients through a journey of self-discovery and transformation: empowering them to make clear and life-affirming career and self-employment decisions. Her process emphasizes alignment of mind, heart, and physical habits and allyship in supporting diverse, inclusive, and equitable work and workplaces.
project MAIN GOAL
The main goal of this project is to streamline BEing U Coaching's digital ecosystem by transitioning from Microsoft 365 to Google Workspace, organizing and aligning multiple email accounts and domains, aligning multiple apps associated with business operations (Calendly, Wave, Slack, Zendesk etc.), and mobile/laptop data flow, optimizing cybersecurity measures, resolving data duplication issues, and improving overall system efficiencies. The aim is to create a more efficient, secure, and well-organized IT infrastructure that supports the coaching hrms operations across multiple organizations.
TASKS TO COMPLETE TO ACHIEVE THE PROJECT GOAL
1. Migration from Msso to Google Workspace: students can nelo pian and execute the migration process from Microsort 36. to Google Workspace. This involves transferring emails, files, and other data while ensuring a smooth transition without significant disruptions to the coaching firm's operations. (includes mobile/laptop cloud and hardware data storage
2. Email and Account Management: They can assist in aligning multiple emails, domains, account-related emails, and apps, and possibly consolidating or organizing them for better efficiency and clarity. Reducing redundancy to maximize efficient workflow is key.
3. Cybersecurity Assessment: Students can evaluate the necessity of security software like Norton, assess the existing security measures, and recommend suitable cybersecurity solutions to protect the coaching firm's digital ecosystem
4. Data Cleanup and Organization: Addressing duplication issues in cloud storage, hard drives, and other data repositories.
Iney can nelo identiry and resolve duplicate dara to streamiine and organize the digital intrastructure errectivelv
5. Efficiency Improvement: Analyzing the workflows and processes across multiple organizations the coach works with, the
students can suggest and implement strategies to ennance system emciencies, possibly leveraging tools or technologies To improved collaboration and productivity.
6. Training and Documentation: Provide training to the owner on the newly implemented Google Workspace, cybersecurity best practices, and efficient data management techniques. Additionally, creating documentation or guides for future.
What to Do (Task)
Manage project team
The work must get done. Ensure that it does.
- List actions your team will perform. How will you track and evaluate the team?
- What happens if a task does not get done? How will you know it does or doesn't get done?
- Is there a particular work schedule for the team? Communications Management
In one page or more provide actions you are taking to communicate to stakeholders
- Identify key stakeholder groups, then...
- Describe exactly what you intend to communicate to each of those stakeholders?
- How will you communicate those messages?
- When. Is there a particular time of the project to send that communication?
Risk Management
- Identify at least three risks that could have potentially have negative outcomes for the project. Explain those risks and how to deal with them.
- Use the Risk Response strategy as shown here
Classification: General
Avoid
eliminate cause of risk
Mitigate
reduce probability or impact of risk
THREATS
Accept
contingency plans.
| Migration v v | 1.1 Hardware Evaluation I 1.2 Software Evaluation I 1.3 Soft Migration l l } 1.1.1 Review Samsung 1.2.1 MS 365 and 1.3.1 Samsung Galaxy Data Galaxy Phones Workspace Assestment Transfer | 1.1.2 Evaluate External | 1.2.2 Security Software | 1.3.2 Plan MS 365 to Devices Review Google Workspace Migration 1.1.3 Examine Brother 1.2.3 Password Printer and WiFi Management Review v 1.3.3 Plan Microsoft Teams to Google Meet Transition . 1.1.4 Verify Back up Book Figure 1: Migration | Security 2.1 Network Security 2.2 Application Security 2.3 Social Media Clean up 2.4 Personal Email Security Review 2.1.1 WiFi Security 2.2.1 Skype and other 2.3.1 Assess and Clean 2.4.1 Secure PErsonal Enhancement Apps Security Chek Social Media Footprint Email Security 2.2.2 Marketing and Sales App Review 3.1 Cloud Storage Optimization . 3.1.1 Asses MS 365 Business, Google Workspace, BEing U, Tfoundation Storage and Data Clean up 3.2 Duplicate Data Clean 3.3 Organize External Up Devices v v 3.2.1 Address Duplication 3.1.1 Regularly Back Up in Cloud Storage External Drive - 3.2.2 Review and Update Bookmarked Information Figure 3: Storage and Data clean up | Training and Closure v | 5.1 User Training | 5.1.1 Google Workspace Training 5.1.2 Security Best Practices | + | 5.2 Documentation | 5.3 Finalization and Review 5.2.1 Document Processes 5.3.1 Final System Check and Configurations 5.2.2 Documentation 5.3.2 Project Review Review Meeting l 5.3.3 Lessons Learned in Project 1 Migration 11 2 Security 21 Week1 Week2 Week3 Weekd4d Week5 Week6 Week7 Week8 Weekd Hardware Evaluation Review Samsung Galaxy 111 Phone 1.1.2 Evaluate External Devices Examine Brother WiFi and 1.1.3 Printer 1.1.4 Verify back-up Book Software Evaluation MS 365 and Workspace 1.2.1 Assestment 1.2.2 Security Software Review Password Management 1.2.3 Review Soft Migration Samsung Galaxy Data 131 Transfer Plan MS365 to Google 1.3.2 Workspace Migration Plan Microsft Teams to 1.3.3 Google Meet Transition Week1l Week2 Week3 Weekd Week5 Week6 Week7 Week8 Week9 Network Security 211 WiFi Security Enchancement - Application Security and Review Skype and Other Apps 221 Security Check Marketing and Sales App 222 Review Social Media Clean UP Asses and Clean Social 231 Media Footprint Secure Personal Email 241 Security Week 1 Week 2 Week3 Week4 Week5 Week6 Week7 Weeks Week9 3 Storage and Data Clean Up 3.1 Cloud Storage Optimization Asses MS 365 Business, Google Workspace, Being U. 3.1.1 foundation 3.2 Duplicate Data Clean Up Address Duplication In Cloud 3.2.1 Storage 3.3 Organize External Devices Regularly Backup External E 3.1.1 Drive Week 1 Week 2 Week3 Week4 Week5 Week6 Week7 Weeks Week9 4 Training and Closure 5.1 User Training 5.1.1 Google Workspace Training 5.1.2 Security Best Practices 5.2 Documentation Document Processes and 5.2.1 Documentation 5.2.2 Documentation Review 5.3 Finalziation and Review 5.3.1 Final System Check 5.3.2 Project Review Meeting 5.3.3 Lesson Learned in ProjectMIGRATION SECURITY STORAGE & DATA CLEAN UP TRAINING & CLOSURE TASK ID TASK &SUB-TASK COST TASK ID TASK & SUB-TASK COST TASK ID TASK & SUB-TASK COST TASK ID TASK & SUB-TASK COST TASK 1.1 Hardware Evaluation $ 500.00 TASK TASK TASK SUB-TASK 2.1 Network Security $ 400.00 3.1 Cloud Storage Optimization $ 300.00 5.1 User Training 300.00 1.1.1 Review SG-Phones $ 100.00 1 12 Evaluate Ex Devices $ 200.00 SUB-TASK SUB-TASK SUB-TASK 1.13 Examine Bro Printer & WIFI 100.00 2.1.1 WiFi Security Enhancement 3.1.1 Asses MS 365 Biz, GWP, BU Foundation 5.1.1 Google Workplace Training 150.00 1.14 Verify Backup Books $ 100.00 5.1.2 Security Best Practice 150.00 TASK TASK TASK 2.2 Application & Security Review $ 300.00 3.2 Duplicate Data Clean UP $ 400.00 1.2 Software Evaluation $ 500.00 TASK SUB-TASK SUB-TASK SUB-TASK 5.2 Documentation $ 400.00 121 MS 365 and workspace Assemt $ 200.00 2.2.1 Skype & other Apps Security check $ 150.00 3.2.1 Address Duplication in Clous Storage $ 200.00 12.2 Security Software Review $ 150.00 2 2.2 Marketing &Sales App Review $ 150.00 3.2.2 Review & Update Bookmarked informatis $ 200.00 SUB-TASK 123 Password Mangement Reviews $ 150.00 5.2.1 Document Processes & Configuration $ 250.00 TASK TASK 5.2.2 Documentions of Review $ 150.00 TASK 2.3 Social Media Clean Up $ 300.00 3.3 Organize External Devices $ 300.00 1.3 Soft Migrations $ 1,000.00 TASK SUB-TASK SUB-TASK 5.3 Finalization and Review 300.00 SUB-TASK 2.3.1 Assess and clean social media Footprint Regularly BackUp External Drive SUB-TASK 13.1 SG Data Transfer $ 300.00 TASK 5.3.1 Final System check 150.00 13.2 Plan MS 365 to G-Workplace mig $ 350.00 2.4 Personal Email Security $ 200.00 5.3.2 Project Review Meeting 100.00 13.3 Plan MS Teams to GM Transition 350.00 5.3.3 Lessons Learned in Project $ 50.00 SUB-TASK 2.4.1 Secure Personal Email Security TOTAL $ 2,000.00 TOTAL $ 1,200.00 TOTAL $ 1,000.00 TOTAL $ 1,000.00ESTIMATED PROJECT BUDGET $5000-&8000 TASKS BUDGETS AND MISCALLENOUS TASKS COST Migration 2,000.00 Security 1,200.00 Storage & Data Clean Up 1,000.00 Training & Closure 1,000.00 Miscallenous 800.00 Grand Total 6,000.00Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started