The Project Management Professional (PMP) is a registered mark of the Project Management Institute, Inc.
Project management can be overwhelming sometimes. However, following these steps can help you to manage your team effectively in complex tasks.
The final domain of PMP®️ is number five, Closing. A project is said to be closed when the team(s) hand over the final project to the customer and communicates to the stakeholders about the completion and releases resources.
Allowing the team to evaluate and maintain a document before moving on to the next step is an important step in every project life cycle. This prevents the team from repeating previous mistakes and helps to make robust processes and effective teams. Project closure is generally the stage of formal completion of all deliverables and, later, the transfer of those same deliverables to the internal or external customers.
In this section, we will look into the tasks used in the PMP “Closing” domain. The PMP certification progress is responsible for the measurement of these tasks:
|Closing – 7%|
|Task 1||Obtain final acceptance of the project deliverables from relevant stakeholders in order to confirm that project scope and deliverables were achieved.|
|Task 2||Transfer the ownership of deliverables to the assigned stakeholders in accordance with the project plan in order to facilitate project closure.|
|Task 3||Obtain financial, legal and administrative closure using generally-accepted practices and policies in order to communicate formal project closure and ensure transfer of liability.|
|Task 4||Prepare and share the final project report according to the communications management plan in order to document and convey project performance and assist in project evaluation.|
|Task 5||Collate lessons learned that were documented throughout the project and conduct a comprehensive project review in order to update the organization’s knowledge base.|
|Task 6||(Read more...)|
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Sumit Bhattacharya. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/80RU7A5ekJs/