You are on page 1of 4

Simple Project

Name Assigned to Start Finish % Complete

1 Pre--‐EngneaeEmtP gEElEn 5/2/2023 5/16/2023 0

2 Scope definition and agreement with the client 5/2/2023 5/2/2023 0

Gathering of initial information about the client's infrastructure


3 5/2/2023 5/9/2023 0
and network

4 Signing of authorisations and agreements 5/2/2023 5/5/2023 0

5 CAB approvals, project timelines, deliverables, and milestones 5/2/2023 5/16/2023 0

6 -‐imerEg tPeExeTm 5/22/2023 7/21/2023 0

7 Reconnaisance and information gathering 5/22/2023 5/29/2023 0

8 Scanning and mapping of the websites and applications 5/26/2023 5/30/2023 0

9 Identification of potential attack vectors 6/1/2023 6/6/2023 0

Exploitation of discovered vulnerabilities to gain access to sys-


10 6/7/2023 6/28/2023 0
tems and data

11 -‐esting of identified attack scenarios and vectors 6/14/2023 7/3/2023 0

12 Tocumentation of all findings, exploits, and recommendations 7/3/2023 7/21/2023 0

13 sEmerEg tPeExeTmtI1t:CroCrgme 6/12/2023 8/11/2023 0

14 Scanning and mapping of the client's network and systems 6/12/2023 6/26/2023 0

15 Identification of potential attack vectors 6/27/2023 6/30/2023 0

Exploitation of discovered vulnerabilities to gain access to sys-


16 7/3/2023 7/17/2023 0
tems and data

17 -‐esting of identified attack scenarios and vectors 7/18/2023 7/25/2023 0

18 Tocumentation of all findings, exploits, and recommendations 7/24/2023 8/11/2023 0

19 sEmerEg tPeEmeTmtp1t2rCgBdgTmlEn 6/19/2023 8/18/2023 0

20 Scanning and mapping of the client's network and systems 6/19/2023 7/4/2023 0

21 Identification of potential attack vectors 7/4/2023 7/21/2023 0

22 Tocumentation of all findings, exploits, and recommendations 7/25/2023 8/18/2023 0

23 PclTclEnt-‐ierdlTe 8/1/2023 8/25/2023 0

24 Plan and Prepare Environment inclD scope, exclusions, whitelists 8/1/2023 8/3/2023 0

25 Tevelop and -‐est Phishing Email 8/3/2023 8/7/2023 0

Exported from .icrosoft Project on 5/12/2023 Page 1 of 4


Simple Project
Name

1 Pre--‐EngneaeEmtP gEElEn

2 Scope definition and agreement with the client

Gathering of initial information about the client's infrastructure


3
and network

4 Signing of authorisations and agreements

5 CAB approvals, project timelines, deliverables, and milestones

6 -‐imerEg tPeExeTm

7 Reconnaisance and information gathering

8 Scanning and mapping of the websites and applications

9 Identification of potential attack vectors

Exploitation of discovered vulnerabilities to gain access to sys-


10
tems and data

11 -‐esting of identified attack scenarios and vectors

12 Tocumentation of all findings, exploits, and recommendations

13 sEmerEg tPeExeTmtI1t:CroCrgme

14 Scanning and mapping of the client's network and systems

15 Identification of potential attack vectors

Exploitation of discovered vulnerabilities to gain access to sys-


16
tems and data

17 -‐esting of identified attack scenarios and vectors

18 Tocumentation of all findings, exploits, and recommendations

19 sEmerEg tPeEmeTmtp1t2rCgBdgTmlEn

20 Scanning and mapping of the client's network and systems

21 Identification of potential attack vectors

22 Tocumentation of all findings, exploits, and recommendations

23 PclTclEnt-‐ierdlTe

24 Plan and Prepare Environment inclD scope, exclusions, whitelists

25 Tevelop and -‐est Phishing Email

Exported from .icrosoft Project on 5/12/2023 Page 2 of 4


Simple Project
Name Assigned to Start Finish % Complete

26 Mickoff Campaign 8/8/2023 8/15/2023 0

27 Analyse and Tocument Results 8/17/2023 8/25/2023 0

Exported from .icrosoft Project on 5/12/2023 Page 3 of 4


Simple Project
Name

26 Mickoff Campaign

27 Analyse and Tocument Results

Exported from .icrosoft Project on 5/12/2023 Page 4 of 4

You might also like