Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture by Nichols, Lester

Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in...
$80.26 SGD
$80.26 SGD
SKU: 9781803235844
Product Type: Books
Please hurry! Only 567 left in stock
Author: Lester Nichols
Format: Paperback
Language: English
Subtotal: $80.26
10 customers are viewing this product
Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture by Nichols, Lester

Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture

$80.26

Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture

$80.26
Author: Lester Nichols
Format: Paperback
Language: English

Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implementing and maintaining robust security structures for the ever-evolving digital landscape

Key Features

- Gain insights into the cybersecurity architect role and master key skills to excel in it

- Acquire a diverse skill set for becoming a cybersecurity architect through up-to-date, practical examples

- Discover valuable tips and best practices to launch your career in cybersecurity

- Purchase of the print or Kindle book includes a free PDF eBook

Book Description

Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat, as it requires both upskilling and a fundamental shift in the way you view cybersecurity altogether. Cybersecurity Architect's Handbook is an all-encompassing guide, introducing the essential skills for aspiring CSAs, outlining a path for cybersecurity engineers and newcomers to evolve into architects, and sharing best practices to enhance the skills of existing CSAs.

Following a brief introduction to the role and foundational concepts, this book will help you understand the day-to-day challenges faced by CSAs, supported by practical examples. You'll gain insights into assessing and improving your organization's security posture, concerning system, hardware, and software security. You'll also get to grips with setting user and system policies and protocols through effective monitoring and enforcement, along with understanding countermeasures that protect the system from unauthorized access attempts.

To prepare you for the road ahead and augment your existing skills, the book provides invaluable tips and practices that will contribute to your success as a CSA. By the end of this book, you'll be well-equipped to take up the CSA role and execute robust security solutions.

What you will learn

- Get to grips with the foundational concepts and basics of cybersecurity

- Understand cybersecurity architecture principles through scenario-based examples

- Navigate the certification landscape and understand key considerations for getting certified

- Implement zero-trust authentication with practical examples and best practices

- Find out how to choose commercial and open source tools

- Address architecture challenges, focusing on mitigating threats and organizational governance

Who this book is for

This book is for cybersecurity professionals looking to transition into a cybersecurity architect role. Solution architects interested in understanding the scope of the role and the necessary skills for success will also find this book useful.

Table of Contents

- Introduction to Cybersecurity

- Cybersecurity Foundation

- What Is a Cybersecurity Architect and What Are Their Responsibilities?

- Cybersecurity Architecture Principles, Design, and Analysis

- Threat, Risk, and Governance Considerations as an Architect

- Documentation as a Cybersecurity Architect - Valuable Resources and Guidance for a Cybersecurity Architect Role

- Entry-Level-to-Architect Roadmap

- The Certification Dilemma

- Decluttering the Toolset - Part 1

- Decluttering the Toolset - Part 2

- Best Practices

- Being Adaptable as a Cybersecurity Architect

- Architecture Considerations - Design, Development, and Other Security Strategies - Part 1

- Architecture Considerations - Design, Development, and Other Security Strategies - Part 2



Author: Lester Nichols
Publisher: Packt Publishing
Published: 03/29/2024
Pages: 494
Binding Type: Paperback
Weight: 1.85lbs
Size: 9.25h x 7.50w x 0.99d
ISBN: 9781803235844

This title is not returnable

Returns Policy

You may return most new, unopened items within 30 days of delivery for a full refund. We'll also pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.).

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, simply login to your account, view the order using the "Complete Orders" link under the My Account menu and click the Return Item(s) button. We'll notify you via e-mail of your refund once we've received and processed the returned item.

Shipping

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.

When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Related Products

Recently Viewed Products