Chief Cybersecurity Architect

Setting up processes and implementing technical measures

Requirements:
  • Basic knowledge of IT technologies, Windows, Linux operating systems and the requirements of the Cybersecurity Act

The course is a practical guide in the implementation of procedural and technical security in response to the legislation, which in the Czech Republic is built on the principles of ISMS (Information Security Management System), or ISO 27001 standard and further contained in Act No. 181/2014 Coll., on cyber security and on the amendment of related laws (Cyber Security Act).

Target group:

  • Cyber Security Architect

  • Employees of OHA (Department of Chief Architect)

  • ZoKB auditor, who checks the Architect's agenda

  • Administrators, external IT Security consultants, network administrators

  • The focus is suitable for CIO (Chief Information Officer) and CSO (Chief Security Officer)

What will you learn

More information
  • Protection of computer network, server systems (Win, Linux)
  • A unique overview of hacking techniques, system attacks, network abuse
  • Weaknesses in the incorrect implementation of routers, Ethernet, Wifi, LAN networks
  • The most risky areas of security from the perspective of the architect's role according to Act. 181/2014 Coll.

Terms

Currency
Term
Place
Length
Language
Price without VAT

No results match the specified filters

Loading...

Do you want this course individually?

Let us know!

This course can be customized - either as an individual training 1:1 or for your team. Just leave us your contact and we will contact you with options tailored to your needs.

Successfully sent

We will contact you.

Timeline

Day 1

09:00 – 10:30 Introduction to ZoKB
  • The role of the Architect
  • ISMS, ISO 27001
Physical security
  • Access protection
  • Fulfillment of ZoKB requirements
10:30 – 10:45 Coffee break
10:45 – 12:15 Application security
  • Application Vulnerabilities
  • Permanent protection of information
Tools for protection
  • Integrity
  • Identity and access control
  • Critical infrastructure, significant IS
12:15 – 13:15 Lunch break
13:15 – 14:45 Detection systemsNetwork and IS protectionVerification and control of communicationCryprographic meansIndustrial and control systems
14:45 – 15:00 Coffee break
15:00 – 17:00 Collection and evaluation of events
  • Integrated collection
  • Informing managers
  • Updating rules and IS

Day 2

09:00 – 10:30 Basics of ISMS
  • The context of the organization
  • ISO 27001 requirements
  • Norms and standards ISO 2700x
  • Leadership, security policy
  • ISMS planning
10:30 – 10:45 Coffee break
10:45 – 12:15 Basics of ISMS
  • Risk analysis according to ISO 27005
  • ISMS support requirements
  • Comparison with Decree 82/2018 ZoKB
12:15 – 13:15 Coffee break
13:15 – 14:45 Implementation of ISMS 1/2
  • Internal audit
  • Constant improvement
  • Operation of the ISMS system
14:45 – 15:00 Coffee break
15:00 – 17:00 Implementation of ISMS 2/2
  • Annex A of the ISO 27001 standard

Day 3

09:00 – 10:30 Virtualization and design testing - PoC (proof of concept)
10:30 – 10:45 Coffee break
10:45 – 12:15 Network security
  • Network components
  • Functionality and vulnerability
12:15 – 13:15 Coffee break
13:15 – 14:45 Vulnerability deployment logs
  • L2, L3
14:45 – 15:00 Coffee break
15:00 – 17:00 IPv4, IPv6 Network services, DHCP, DNS, etc.

Day 4

09:00 – 10:30 Infrastructure and monitoring
10:30 – 10:45 Coffee break
10:45 – 12:15 Technical Audit
  • Audit of user accounts
  • Audit of operating systems
12:15 – 13:15 Coffee break
13:15 – 14:45 Monitoring Logging
14:45 – 15:00 Coffee break
15:00 – 17:00
  • Proactive monitoring
  • Collection of data from the infrastructure and their analysis

Day 5

09:00 – 10:30 Security and vulnerability
10:30 – 10:45 Coffee break
10:45 – 12:15 Encryption
  • Operating systems - applications, network traffic - remote access - SSLVPN, IPSec, etc.
12:15 – 13:15 Coffee break
13:15 – 14:45 Case study of Chief Cybersecurity Architect
14:45 – 15:00 Coffee break
15:00 – 17:00 Conclusion
  • Safety Management Handbook
  • Practical recommendations in the role of an architect
  • Block length 90 min.
  • Teaching hours 40
  • Refreshments Yes
  • Exam Yes

The course is a practical guide in the implementation of procedural and technical security in response to the legislation, which in the Czech Republic is built on the principles of ISMS (Information Security Management System), or ISO 27001 standard and further contained in Act No. 181/2014 Coll., on cyber security and on the amendment of related laws (Cyber ​​Security Act).

The certification exam takes place as part of the training on the last day of the course. Candidates who participate in the course in the form of a virtual classroom will also take the certification exam online.

Prestigious certification included

Chief Cybersecurity Architect

The certificate documenting the professional competence of security roles meets the requirements of ISO 17024, which are defined by Decree No. 82/2018 Coll. on security measures, cyber security incidents, reactive measures, submission requirements in the field of cyber security and data disposal (decree on cyber security).

As part of the certification, they must demonstrate practical knowledge and skills to implement an ISMS (Information Security Management System) in such a way that it meets legislative requirements and at the same time complies with the ISO/IEC 27001 standard in the current valid version.

Certification instructions

Exam format

No. of questions: 40

Pass mark: 60%

Language: Czech

Certificate validity: 3 years

Frequently asked questions

All questions

Are these courses certified under Act Roles?

Yes. TAYLLORCOX is the official accredited training organization for ISMS. The courses are based on international accreditation and are localized in the Czech legislative environment.

Licensed trainers hold the highest level of ISMS ISO/IEC 27001 Lead Auditor. Rich experience resulting from security audits and implementation of measures against cyber attacks is a guarantee of hands-on learning.

Can one person handle multiple roles at the same time?

Yes, it is possible for one person to be both a cybersecurity manager and architect and an asset guarantor. However, none of these roles can also hold the role of auditor. In that case, however, let's keep in mind that you are not in line with best-practice.

How does the final exam and certification work?

The final exam can be taken:

a) Online from the comfort of your home.

b) On paper at the TAYLLORCOX campus.

If you are interested, you can purchase additional exam insurance, with which you get a second attempt for free in the event of failure on the first attempt.

The outcome of a successfully completed exam is a prestigious, accredited and globally recognized certificate.

Your next career step