Implementation Plan Template CMGT/445 Version 6 1 University of Phoenix Material Implementation Plan Template Use the following template to create your implementation plan in Week Four. Project Name or Identification: Wireless Access Points Team B Project Stakeholders · Information System Security Manager, Operations Lead, Configuration Management Lead, Network Operations Lead, and Physical Security Project Description · Implement Wireless access points in the headquarters building · Conduct Risk assessment and threat analysis Measurable Organizational Value (MOV) · All wireless network access from anywhere within the building and campus grounds · Risk assessement and threat analysis · ROI (return on investment) and cost versus benefit · Statement or table format Project Scope · There will be a 2 phase implementation process with a due date of 1 January 2016. · What will be considered outside the scope of this project? · What are the project’s main deliverables? · Provide a statement and description. Project Schedule Summary · 1 November 2015 · 1 January 2015 · Replace all infrastructure/core network equipment outside the 3 year life cyce replacement. · 14 day project review, 20 day review, 30 day review, 45 day review, 50 day review, and 60 day review. Project Budget Summary · Total project budget · Budget broken down by phase Resources Required · Consultant · Tech support 24/7 · Project manager · Onsite tech support Assumptions and Risks · Assumptions used to develop estimates · Key risks, probability of occurrence, and impact · Organizational or time constraints · Risks of not doing this project · Assess dependencies on other projects or areas within or outside the organization · Assessment project’s impact on the organization · Outstanding issues · Formulation of key project risk mitigation strategies Project Administration · Communications plan · Scope management plan · The change control process · Quality management plan · Testing procedures related to the implementation · Change management plan Implementation and Continued Maintenance and Project Closure Plan · Protocol changes will need to be made · Access range will need to be managed · Access scan process will need to be implemented · The new technology will be implemented in phases; hardware phase; protocol/configuration phase; test phase · Support and maintenance · Technical, user, and system training documentation · System support roles and functions · Project closure Acceptance and Approval · Information System Security Manager and Director of Communication and Networks. · Submit Information Technology Request for the approval process. · The request has to be approved by the Operations Lead, Project Lead, Information System Security Manager, Physical Security Manager and last the Chief Information Officer/Director of Communications References Project Scope Statement. (2014). Retrieved from http://mantecausd.net/Home/ShowDocument?id=1073 Copyr.