Cybersecurity Architect (AKB1)

Cybersecurity, ICT Security

This course focuses on the design, implementation, and development of information architecture within organizational security. You will learn how to design and implement security measures in line with the Cybersecurity Act No. 181/2014 Coll. The course is also in line with the requirements of the NIS2 directive, which emphasizes strengthening the cyber resilience of key and significant entities.

We will prepare you for the position of Cybersecurity Architect. A Cybersecurity Architect designs the security architectures of information systems, their individual components, interconnections, and oversees the compliance of information system architecture with the information security management system. They also propose ways for further development of information security management as a basis for decision-making by the organization's management and their owners.

Location, current course term



Brno + online (volitelně)
9/22/2025 - 9/26/2025 CZECH
Order
1/12/2026 - 1/16/2026 CZECH
Order
Praha + online (volitelně)
11/3/2025 - 11/7/2025 CZECH
Order
1/26/2026 - 1/30/2026 CZECH
Order
Custom Customized Training (date, location, content, duration)

The course:

Hide detail
  • Introduction to ZoKB and risk management
    1. Law requirements for Critical Information Infrastructure (CII)
    2. Laws, directives, and standards for CII
    3. Architect's role
    4. Implementing ISMS and ISO 27001 in an organization with CII
    5. Critical infrastructure and significant information systems
    6. Physical security of CII objects
    7. Risk analysis and risk management in CII
    8. Continuity of risk analysis measures
    9. Management and management of CII assets
    10. Supplier management
  • Identity and access control
    1. Using identities in Windows and Active Directory
    2. Using identities in Linux
    3. User identity management using centralized IDM
    4. Access control and secure user behavior
    5. Access control to operating system resources
    6. Access control to databases
    7. Password management
    8. Implementation of 2FA
    9. Vulnerabilities of 2FA
  • Client security
    1. Antivirus and AntiMalware
    2. Next Generation antiviruses
    3. Data Lost Prevention systems
    4. Certificate management on clients
    5. Disk and USB encryption – Bitlocker and EFS
    6. Email and web communication security
  • Logging and audit
    1. Logging in Windows
    2. Logging in Linux
    3. Logging in applications
    4. Typical logging mechanisms
    5. Definition of activity recording requirements according to ZKB
    6. Requirements for accurate time
    7. Access logging and work with network elements
    8. Logging at the level of operating systems and at the application level
    9. Central tools for log collection and event evaluation
    10. Description of basic SIEM functionality
  • Development and application security
    1. Comparison of different application architectures
    2. Application vulnerability
    3. Acquisition, development, and maintenance
    4. Principles of secure software development
    5. System Development Life Cycle
    6. Testing of developed applications
    7. Use of uniform templates for automation and management
  • Network architecture
    1. Next Generation Firewalls
    2. Next Generation Intrusion Prevention Systems
    3. DDoS – attack nature and protection methods
    4. Principles of L2 and L3 network segmentation
    5. Principles of creating DMZ
    6. Merging and determining applications into VLAN
    7. Implementation of VPN and detection of KBU / KBI
    8. Network and application view
  • Network security
    1. Basic rules for L2 and L3 network design
    2. Principles of L2 attacks
    3. MitM attacks using ARP
    4. Attacks on SPT (Spanning Tree)
    5. Attacks on VLAN
    6. Attacks on L3 routing protocols
    7. Recommendations for switch configuration – access control
  • Detection and monitoring of intrusions
    1. Requirements for continuous KBU evaluation
    2. Behavioral analysis of network traffic
    3. Implementation and deployment of SIEM
    4. Analysis of detected KBU
    5. Evaluation and response to KBU
  • Ensuring high availability
    1. Business continuity analysis methods
    2. Requirements for the design of highly available systems
    3. High availability in practice
    4. High availability for control systems and real-time systems
    5. Continuity with business continuity analysis
    6. Support / Service
    7. SLA for ensured high availability
    8. Spare parts
Assumed knowledge:
General knowledge of the requirements of Act No. 181/2014 Coll., basic knowledge of TCP/IP protocol and OSI model, knowledge of operating systems, basic orientation in technical security measures.
Schedule:
5 days (9:00 AM - 5:00 PM )
Course price:
1 472.00 € (1 781.12 € incl. 21% VAT)
Language:

Vybrané zákaznické reference

Jaroslav Kurinec, Jaroslav K.
Cybersecurity Architect ( AKB1)
"Kurz byl velice zajímavý a přínosný. Pan Urbiš je velice schopný člověk. Jen škoda, že kurz není delší, protože by se mohlo stihnout více labů. "
DAKO-CZ, a.s., Jakub B.
Cybersecurity Architect ( AKB1)
"Skvělá atmosféra, velmi podrobné - budu muset vstřebat informace a znovu přehrát ze záznamu. Neměnil bych nic, jen bych zpomalil v mém případě :-)"
LXL COMPUTER, s.r.o., Luděk R.
Cybersecurity Architect ( AKB1)
"Děkujeme za informačně nabitý týden ;-) "
myonic s.r.o., Kamil K.
Cybersecurity Architect ( AKB1)
"Skvělé praktické ukázky. Školení i pro technicky zaměřené IT. Lektor s širokým přehledem v dané oblasti. Mnoho prezentovaných informací určitě využiji i v praxi."
Inventec (Czech), s.r.o., Jiří T.
Cybersecurity Architect ( AKB1)
"Neskutečná erudice lektora. Oceňuji především jeho přístup a přehled. Odborná úroveň a množství praktických příkladů předčilo mé očekávání. Jednoznačně doporučuji tento kurz komukoliv, kdo to myslí s bezpečností vážně."
Lesy České republiky, s.p., Veronika D.
Cybersecurity Architect ( AKB1)
"Rozsah znalosti skolitele byll neuveritelny. Velmi prinosne skoleni"
Česká zbrojovka a.s., Petr K.
Cybersecurity Architect ( AKB1)
"Konečně školení, ze kterého si člověk něco odnáší do praxe, jen tak dál. Díky"
Česká pošta, s.p., Filip J.
Cybersecurity Architect ( AKB1)
"Skoleni jako takove super."
NEWPS.CZ s.r.o., Jiří F.
Cybersecurity Architect ( AKB1)
"dobre se spoustou ukazek v prubehu"
IZODYNA s.r.o., Marek M.
Cybersecurity Architect ( AKB1)
"Vynikajúci lektor, výborné témy. príklady z praxe. ako vzdy za mna skvele skolenie."