The course provides an overview of the Cybersecurity Act, its key concepts, and practical application. Participants will learn how to implement legal requirements, identify, and address cybersecurity threats. They will also gain hands-on [...]
  • IBMSIEM
  • Duration 1 day
  • 0 ITK points
  • 2 terms
  • ČR (3 900 Kč)

    SR (on request)

The course provides an overview of the Cybersecurity Act, its key concepts, and practical application. Participants will learn how to implement legal requirements, identify, and address cybersecurity threats. They will also gain hands-on experience in deploying and utilizing a SIEM system for monitoring and incident response. The course concludes with a discussion on trends, challenges, and best practices.

»

Block I: Introduction to the Cybersecurity Act

  • Introduction to Cybersecurity
  • Definition of key terms in the Cybersecurity Act
  • Framework of legal obligations and responsibilities in cybersecurity
  • Practical aspects of compliance with the Act
  • Implementation of basic rules and guidelines
  • Identification and resolution of cybersecurity threats

Block II: The Role of SIEM in Meeting the Act’s Requirements

  • Functions and benefits of SIEM in the context of the Cybersecurity Act
  • Monitoring and analysis of cybersecurity incidents
  • Logging and reporting in compliance with legal standards
  • Practical workshop – SIEM implementation
  • Configuration and deployment of SIEM to meet legal requirements
  • Simulation of cybersecurity incidents and their resolution using SIEM

Block III: Discussion and Conclusion

  • Discussion – Experiences and opinions of participants
  • Sharing insights and best practices in cybersecurity
  • Debates on current trends and challenges
Current offer
Training location
Course language

The prices are without VAT.

Custom Training

Didn’t find a suitable date or need training tailored to your team’s specific needs? We’ll be happy to prepare custom training for you.