Show all

PEDUA2 - Cyber Security Architect II.

Guide to Security Architect Roles - Cybersecurity Design and Operations
Level
Designed for participants with basic knowledge and experience
intermediate
Course length
2 days
Language
 cz  eu
Course code
PU23010120
Security
Category:
Do you want this tailor-made course to your company? Contact us

Courses on a specific date with a live lecturer

Term
Language
Place
Form
?
How and where the course takes place.
Price without VAT
3. - 4. 6. 2024
Language
Place
online
Form
virtual classroom
?
Online training with a lecturer at a specific time.
Code of the course: PU23010120-0005
Price without VAT
19 900 Kč
Open term
?
We will agree on a specific date together. This is a non-binding order.
Language
Place
Praha
Form
classroom
?
The course with an instructor in classroom.
Code of the course: PU23010120-0001
Price without VAT
19 900 Kč
Open term
?
We will agree on a specific date together. This is a non-binding order.
Language
Place
online
Form
virtual classroom
?
Online training with a lecturer at a specific time.
Code of the course: PU23010120-0002
Price without VAT
19 900 Kč

Course description

2-day course that builds on the basics of the company's security architecture and deepens the view of daily work on proposals and change assessment and operationally connected to the security of the company's assets.

Required knowledge

Completion of the Cybersecurity Architect I course.
Experience with architecture is an asset, logical and structured thinking, perception of the need for comprehensive risk management while protecting the assets of the company being addressed.

Target audience

  • Security analyst or documentarian
  • Security process specialist
  • Aspiring Enterprise Security Architect
  • Project leader or manager of security projects
  • ISMS internal or external auditor
  • Personal data processing officer
  • Data or information architect
  • Business architect
  • SW architect
  • Infrastructure - technology architect

Course content

  • Security architecture design according to patterns
  • Context of technical and managerial perspectives on systems protection
  • Logical security architecture - layer details
  • Physical security architecture - layer details
  • Security Architecture Decomposition
  • Operation of security architecture
  • Security policies and their management
  • Operational risk management and its categories, standards
  • Assurance review and audit approaches
  • Detailed processes of the company security operative incl. documentation and reporting
  • Standards and legislation (global and local areas)

Materials

Materials in electronic form

Objectives

  • Present the tasks of the cybersecurity architect role from an operational perspective.
  • Bring details of the context and interrelationships of security measures.
  • Recommend mediation and mentoring procedures in making this area accessible to a wide range of consumers of cataloged security services.

Lecturers

Luboš Fryc
Luboš Fryc

Enterprise Security Architect
Lubos is a long-time professional in the field of corporate, security architecture, quality assurance and information security management.
He currently focuses on providing consulting and educational services to many clients in the Czech Republic and abroad. He teaches EA | ESA at the master's degree of the University of South Bohemia.
As an authorized trainer, he often leads accredited courses by The Open Group and holds a number of their certificates.

Do you want this tailor-made course for your company?

Contact us

News with the course

Náhledový obrázek novinky
Security 18. 1. 2024
Successful first run of the new Cybersecurity course

We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?

Previous courses

Do you want this tailor-made course for your company?

Contact us

News with the course

Náhledový obrázek novinky
Security 18. 1. 2024
Successful first run of the new Cybersecurity course

We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?

Why with us