Cybersecurity Architect

Design and development of information architecture

Requirements:
  • Knowledge of ISMS (ISO/IEC 27001)

Cyber Security Architect Role

We will show you how to take responsibility for designing the implementation of security measures. You'll get tips for securing your security architecture.

A cyber security architect ensures the design and implementation of security measures. In practice, an architect is responsible for the design of a secure architecture (eg from infrastructure to application-level security) and its subsequent implementation. There can be more architects in an organization, when each one has their own specialization.

Functions and tasks of a cyber security architect:

  • Promote safety in concept development

  • Provide security assurance resources for development and concept activities

What will you learn

More information
  • Learn how to properly manage architecture changes
  • Learn to use ISMS (Information Security Management System)
  • You will master ISO 27001 from the point of view of the requirements §181/2014 Coll.
  • Learn to specify and implement technical measures (IS, licenses, HW, technical settings and configuration)

Terms

Currency
Term
Place
Length
Language
Price without VAT

No results match the specified filters

Loading...

Do you want this course individually?

Let us know!

This course can be customized - either as an individual training 1:1 or for your team. Just leave us your contact and we will contact you with options tailored to your needs.

Successfully sent

We will contact you.

Timeline

Day 1

09:00 – 10:30 Introduction to ZoKB
  • The role of the Architect
  • ISMS, ISO 27001
Physical security
  • Access protection
  • Fulfillment of ZoKB requirements
10:30 – 10:45 Coffee break
10:45 – 12:15 Application security
  • Application Vulnerabilities
  • Permanent protection of information
Tools for protection
  • Integrity
  • Identity and access control
  • Critical infrastructure, significant IS
12:15 – 13:15 Lunch break
13:15 – 14:45 Detection systems
  • Network and IS protection
  • Verification and control of communication
Collection and evaluation of events
  • Integrated collection
  • Informing managers
  • Updating rules and IS
Cryprographic meansIndustrial and control systems
14:45 – 15:00 Coffee break
15:00 – 16:00 Conclusion
  • Summary
  • Questions, Tips
16:00 – 17:00 Exam
  • ZoKB Architect Certification §181/2014Coll.
  • Block length 90 min.
  • Teaching hours 8
  • Refreshments Yes
  • Exam Yes

Implement the Cyber ​​Security Act §181/2014Sb.efficiently and simply.

An easy-to-understand, step-by-step implementation of the requirements of the Cyber ​​Security Act. You can easily handle the entire project yourself.

The certification exam takes place as part of the training on the last day of the course. Candidates who participate in the course in the form of a virtual classroom will also take the certification exam online.

Prestigious certification included

Cybersecurity Architect

The certificate documenting the professional competence of security roles meets the requirements of ISO 17024, which are defined by Decree No. 82/2018 Coll. on security measures, cyber security incidents, reactive measures, submission requirements in the field of cyber security and data disposal (decree on cyber security).

As part of the certification, candidates they must demonstrate practical knowledge and skills to implement an ISMS (Information Security Management System) in such a way that it meets legislative requirements and at the same time complies with the ISO/IEC 27001 standard in the current valid version.

Certification instructions

Exam format

Number of questions: 30

Passmark: 60%

Language: Czech

Certificate validity: 3 years

Frequently asked questions

All questions

Are these courses certified under Act Roles?

Yes. TAYLLORCOX is the official accredited training organization for ISMS. The courses are based on international accreditation and are localized in the Czech legislative environment.

Licensed trainers hold the highest level of ISMS ISO/IEC 27001 Lead Auditor. Rich experience resulting from security audits and implementation of measures against cyber attacks is a guarantee of hands-on learning.

Can one person handle multiple roles at the same time?

Yes, it is possible for one person to be both a cybersecurity manager and architect and an asset guarantor. However, none of these roles can also hold the role of auditor. In that case, however, let's keep in mind that you are not in line with best-practice.

How does the final exam and certification work?

The final exam can be taken:

a) Online from the comfort of your home.

b) On paper at the TAYLLORCOX campus.

If you are interested, you can purchase additional exam insurance, with which you get a second attempt for free in the event of failure on the first attempt.

The outcome of a successfully completed exam is a prestigious, accredited and globally recognized certificate.

Your next career step