![Cybersecurity Architect's Handbook : An end-to-end guide to implementing and maintaining robust security architecture - Lester Nichols](https://www.booktopia.com.au/covers/big/9781803239897/9226/cybersecurity-architect-s-handbook.jpg)
eBOOK
Cybersecurity Architect's Handbook
An end-to-end guide to implementing and maintaining robust security architecture
By: Lester Nichols
eBook | 29 March 2024
At a Glance
eBook
RRP $73.69
$66.99
OR
Free with Kobo Plus Read
Start Free Trial *- Subscribe and read all you want.
- $13.99 a month after free trial. Cancel Anytime. Learn more.
Instant Digital Delivery to your Booktopia Reader App
Read on
Learn how to design and manage elegant cybersecurity solutions to mitigate risk and fight off modern threats
Key Features
- Gain insight into the cybersecurity architect role and learn how to excel in it
- Acquire all the different skills needed to become a CA through up-to-date practical examples
- Discover useful tips and best practices that will help you hit the ground running
Book Description
Stepping up to become a cybersecurity architect is (CA) no mean feat since it requires both upskilling and changing the way you view cybersecurity altogether. The Cybersecurity Architect's Handbook is a comprehensive guide that introduces skills needed to become a security architect, lays out a path for cybersecurity engineers to become architects, and shares the best practices to enhance the skills of existing security architects.
After a brief introduction to the role, this book will help you understand the day-to-day challenges of a security architect, illustrated with practical examples. You'll learn to identify the weaknesses of your company's security posture, as well as find ways to improve and update the systems hardware and software security. You'll also get to grips with setting user policies and protocols, monitoring, and enforcing them. This will help you understand countermeasures that protect the system when an unauthorized user attempts to gain access to the system. To prepare you for the road ahead and build on your existing skills, the book will finish off with some of the best tips and practices that will help you succeed in your career as a security architect.
By the end of the book, you will be efficiently able to both plan and execute your organization's security.
What you will learn
- Learn the soft skills required for the CA Role
- Familiarize yourself with the how, what, why, where, and when of a CA
- Build upon your cybersecurity knowledge
- Gain a thorough understanding of KSATs
- Walk through the day in the life of a CA
- Learn strategies and design with practical examples
Who This Book Is For
This book is for cybersecurity architects and cybersecurity professionals who want to move into a cybersecurity architect role — but all cybersecurity professionals and solution architects interested in this field will find this book useful. You'll need some professional experience and a solid understanding of cybersecurity concepts to get the most out of this book.
Table of Contents
- The Five W's
- The Persona
- The Alpha Geek
- Global Impact
- Career Roadmap
- Part One Hands-On and Practical Examples
- Knowledge
- Skills
- Attributes
- Tasks
- Tying it All Together
- Part Two Hands-On and Practical Examples
- The CA Habits
- The CA Best Practices
- The day in the Life of a CA
- Continuing Education and Experience
- The future of the Global Security Architect Champion
- Part Three Hands-On and Practical Examples
- Designing a Zero-Trust Architecture
- Evaluating Government, Risk and Compliance (GRC)
- Designing Server, Endpoint, SaaS, PaaS, and IaaS Services
- Developing Strategies for Data and Apps
- Part Four Hands-On and Practical Examples
Read on
ISBN: 9781803239897
ISBN-10: 1803239891
Published: 29th March 2024
Format: ePUB
Language: English
Publisher: Packt Publishing
You Can Find This eBook In
This product is categorised by
- Non-FictionComputing & I.T.Computer SecurityData Encryption
- Non-FictionComputing & I.T.Computer Networking & CommunicationsNetwork Security
- Non-FictionComputing & I.T.Computer HardwareMaintenance & Repairs
- Non-FictionComputing & I.T.Computer ScienceComputer Architecture & Logic DesignParallel Processing