Get Free Shipping on orders over $79
Cybersecurity Architect's Handbook : An end-to-end guide to implementing and maintaining robust security architecture - Lester Nichols

Cybersecurity Architect's Handbook

An end-to-end guide to implementing and maintaining robust security architecture

By: Lester Nichols

eText | 29 March 2024 | Edition Number 1

At a Glance

eText


$73.69

or 4 interest-free payments of $18.42 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Learn how to design and manage elegant cybersecurity solutions to mitigate risk and fight off modern threats

Key Features

  • Gain insight into the cybersecurity architect role and learn how to excel in it
  • Acquire all the different skills needed to become a CA through up-to-date practical examples
  • Discover useful tips and best practices that will help you hit the ground running

Book Description

Stepping up to become a cybersecurity architect is (CA) no mean feat since it requires both upskilling and changing the way you view cybersecurity altogether. The Cybersecurity Architect's Handbook is a comprehensive guide that introduces skills needed to become a security architect, lays out a path for cybersecurity engineers to become architects, and shares the best practices to enhance the skills of existing security architects.

After a brief introduction to the role, this book will help you understand the day-to-day challenges of a security architect, illustrated with practical examples. You'll learn to identify the weaknesses of your company's security posture, as well as find ways to improve and update the systems hardware and software security. You'll also get to grips with setting user policies and protocols, monitoring, and enforcing them. This will help you understand countermeasures that protect the system when an unauthorized user attempts to gain access to the system. To prepare you for the road ahead and build on your existing skills, the book will finish off with some of the best tips and practices that will help you succeed in your career as a security architect.

By the end of the book, you will be efficiently able to both plan and execute your organization's security.

What you will learn

  • Learn the soft skills required for the CA Role
  • Familiarize yourself with the how, what, why, where, and when of a CA
  • Build upon your cybersecurity knowledge
  • Gain a thorough understanding of KSATs
  • Walk through the day in the life of a CA
  • Learn strategies and design with practical examples

Who This Book Is For

This book is for cybersecurity architects and cybersecurity professionals who want to move into a cybersecurity architect role — but all cybersecurity professionals and solution architects interested in this field will find this book useful. You'll need some professional experience and a solid understanding of cybersecurity concepts to get the most out of this book.

Table of Contents

  1. The Five W's
  2. The Persona
  3. The Alpha Geek
  4. Global Impact
  5. Career Roadmap
  6. Part One Hands-On and Practical Examples
  7. Knowledge
  8. Skills
  9. Attributes
  10. Tasks
  11. Tying it All Together
  12. Part Two Hands-On and Practical Examples
  13. The CA Habits
  14. The CA Best Practices
  15. The day in the Life of a CA
  16. Continuing Education and Experience
  17. The future of the Global Security Architect Champion
  18. Part Three Hands-On and Practical Examples
  19. Designing a Zero-Trust Architecture
  20. Evaluating Government, Risk and Compliance (GRC)
  21. Designing Server, Endpoint, SaaS, PaaS, and IaaS Services
  22. Developing Strategies for Data and Apps
  23. Part Four Hands-On and Practical Examples
on
Desktop
Tablet
Mobile

More in Maintenance & Repairs