Cybersecurity Auditor

The security role responsible for performing the audit

Requirements:
  • Basic knowledge of ISMS (ISO 27001)

The cyber security auditor performs his role impartially and the performance of his role is separate from the performance of the role of ZoKB Manager, ZoKB Architect and ZoKB Guarantor. The auditor's independence from the subject of the audit is also a matter of course!

The role of a cyber security auditor is incompatible with the performance of the roles of cyber security manager, cyber security architect, operator of communication and information systems, or the role of asset guarantor.

Functions and tasks of a cyber security auditor:

  • In cooperation with the ZoKB Manager, he/she participates in planning the audit

  • Evaluates the compliance of implemented security measures with requirements

  • Provides independent feedback on the effectiveness of the information security system

  • Based on the findings during the audit, he/she processes the conclusions and documents the results

What will you learn

More information
  • Plan and prepare the audit
  • Evaluate the obtained outputs and implement measures
  • Prepare an audit report and implement corrective measures
  • Prepare a differential analysis of IS against the requirements of the Cyber Security Act

Terms

Currency
Term
Place
Length
Language
Price without VAT

No results match the specified filters

Loading...

Do you want this course individually?

Let us know!

This course can be customized - either as an individual training 1:1 or for your team. Just leave us your contact and we will contact you with options tailored to your needs.

Successfully sent

We will contact you.

Timeline

Day 1

09:00 – 10:30 ISMS
  • Cyber ​​Security Audit
  • Evaluation of the effectiveness of the measures taken
  • Assessment of controls, audits and impacts of incidents on the system
  • Updating the risk assessment report, security policy and other plans
Risk management
  • Asset identification and valuation
  • Establishing criteria for threat assessment
  • Statement of applicability, risk management plan, benefits of measures
Security requirements
  • Policy
  • Organizational security
  • Terms and conditions and recommendations
  • The role of suppliers in the development, operation and management of IS
Asset Management
  • Asset protection audit
  • Dependence of primary and supporting assets
10:30 – 10:45 Coffee break
10:45 – 12:15 Security of human resources
  • Role audit
  • Rights and obligations
  • Policy control by users, administrators
Management of traffic and communications
  • Analysis of the rights and obligations of persons
  • Audit and evaluation of the information obtained
  • Assessment of the impacts of reactive measures on IS
Access control and secure user behavior (A)
  • Audit of access to systems
  • Results of vulnerabilities and potential exploits
Analysis, development and maintenance
  • Risk identification, assessment and management
  • Risk assessment and management procedures, methodology
  • Safety testing of changes before going live
12:15 – 13:15 Lunch break
13:15 – 14:45 Managing cyber events and incidents
  • Investigation and causes of incidents
  • Classification of incidents and events
Business continuity management
  • Investigation and causes of incidents
Cyber ​​Security Audit
  • Documentation, policies and results
  • Audit by a person with professional qualifications
  • Vulnerability check and assessment
14:45 – 15:00 Coffee break
15:00 – 17:00 Certification
  • Exam Auditor ZoKB 181/2014Coll.
  • Block length 90 min.
  • Teaching hours 8
  • Refreshments Yes
  • Exam Yes

The basis of the Cyber ​​Security Act is the ISMS (Information Security Management System), or Information security management system.

The certification exam takes place as part of the training on the last day of the course. Candidates who participate in the course in the form of a virtual classroom will also take the certification exam online.

Prestigious certification included

Cybersecurity Auditor

The certificate documenting the professional competence of security roles meets the requirements of ISO 17024, which are defined by Decree No. 82/2018 Coll. on security measures, cyber security incidents, reactive measures, submission requirements in the field of cyber security and data disposal (decree on cyber security).

As part of the certification, candidates must demonstrate practical knowledge and skills to audit an ISMS (Information Security Management System) so that it meets legislative requirements and at the same time complies with the ISO/IEC 27001 standard in the current valid version.

Certification instructions

Exam format

Number of questions: 30

Pass mark: 60%

Language: Czech

Certificate validity: 3 years

Frequently asked questions

All questions

Are these courses certified under Act Roles?

Yes. TAYLLORCOX is the official accredited training organization for ISMS. The courses are based on international accreditation and are localized in the Czech legislative environment.

Licensed trainers hold the highest level of ISMS ISO/IEC 27001 Lead Auditor. Rich experience resulting from security audits and implementation of measures against cyber attacks is a guarantee of hands-on learning.

Can one person handle multiple roles at the same time?

Yes, it is possible for one person to be both a cybersecurity manager and architect and an asset guarantor. However, none of these roles can also hold the role of auditor. In that case, however, let's keep in mind that you are not in line with best-practice.

How does the final exam and certification work?

The final exam can be taken:

a) Online from the comfort of your home.

b) On paper at the TAYLLORCOX campus.

If you are interested, you can purchase additional exam insurance, with which you get a second attempt for free in the event of failure on the first attempt.

The outcome of a successfully completed exam is a prestigious, accredited and globally recognized certificate.

Your next career step