Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat, as it requires both upskilling and a fundamental shift in the way you view cybersecurity altogether. Cybersecurity Architect’s Handbook is an all-encompassing guide, introducing the essential skills for aspiring CSAs, outlining a path for cybersecurity engineers and newcomers to evolve into architects, and sharing best practices to enhance the skills of existing CSAs.
Following a brief introduction to the role and foundational concepts, this book will help you understand the day-to-day challenges faced by CSAs, supported by practical examples. You'll gain insights into assessing and improving your organization’s security posture, concerning system, hardware, and software security. You'll also get to grips with setting user and system policies and protocols through effective monitoring and enforcement, along with understanding countermeasures that protect the system from unauthorized access attempts.
To prepare you for the road ahead and augment your existing skills, the book provides invaluable tips and practices that will contribute to your success as a CSA. By the end of this book, you’ll be well-equipped to take up the CSA role and execute robust security solutions.

1144802658
Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat, as it requires both upskilling and a fundamental shift in the way you view cybersecurity altogether. Cybersecurity Architect’s Handbook is an all-encompassing guide, introducing the essential skills for aspiring CSAs, outlining a path for cybersecurity engineers and newcomers to evolve into architects, and sharing best practices to enhance the skills of existing CSAs.
Following a brief introduction to the role and foundational concepts, this book will help you understand the day-to-day challenges faced by CSAs, supported by practical examples. You'll gain insights into assessing and improving your organization’s security posture, concerning system, hardware, and software security. You'll also get to grips with setting user and system policies and protocols through effective monitoring and enforcement, along with understanding countermeasures that protect the system from unauthorized access attempts.
To prepare you for the road ahead and augment your existing skills, the book provides invaluable tips and practices that will contribute to your success as a CSA. By the end of this book, you’ll be well-equipped to take up the CSA role and execute robust security solutions.

47.99 In Stock
Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture

by Lester Nichols
Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture

by Lester Nichols

eBook

$47.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat, as it requires both upskilling and a fundamental shift in the way you view cybersecurity altogether. Cybersecurity Architect’s Handbook is an all-encompassing guide, introducing the essential skills for aspiring CSAs, outlining a path for cybersecurity engineers and newcomers to evolve into architects, and sharing best practices to enhance the skills of existing CSAs.
Following a brief introduction to the role and foundational concepts, this book will help you understand the day-to-day challenges faced by CSAs, supported by practical examples. You'll gain insights into assessing and improving your organization’s security posture, concerning system, hardware, and software security. You'll also get to grips with setting user and system policies and protocols through effective monitoring and enforcement, along with understanding countermeasures that protect the system from unauthorized access attempts.
To prepare you for the road ahead and augment your existing skills, the book provides invaluable tips and practices that will contribute to your success as a CSA. By the end of this book, you’ll be well-equipped to take up the CSA role and execute robust security solutions.


Product Details

ISBN-13: 9781803239897
Publisher: Packt Publishing
Publication date: 03/29/2024
Sold by: Barnes & Noble
Format: eBook
Pages: 494
File size: 9 MB

About the Author

Lester E. Nichols III currently resides in North Texas and is the Director Security Architecture/VP Cybersecurity Operations at JPMorgan Chase & Co. Previous experience includes the Director of IT Infrastructure and Security for a development company, SOC oversight manager/Senior Infrastructure Officer within DHS and previous experience in Local/Federal/DoD/financial sectors. Lester has post graduate education with a Master's of Science Degree in Information Assurance from Norwich University, the oldest private military school in the United States, and multiple industry certifications including CISSP and SANS certs, as well as others. Lester is also a contributing author to the Computer Security Handbook 5th-6th Editions by Wiley Press.

Table of Contents

Table of Contents
  1. Introduction to Cybersecurity
  2. Cybersecurity Foundation
  3. What Is a Cybersecurity Architect and What Are Their Responsibilities?
  4. Cybersecurity Architecture Principles, Design, and Analysis
  5. Threat, Risk, and Governance Considerations as an Architect
  6. Documentation as a Cybersecurity Architect – Valuable Resources and Guidance for a Cybersecurity Architect Role
  7. Entry-Level-to-Architect Roadmap
  8. The Certification Dilemma
  9. Decluttering the Toolset – Part 1
  10. Decluttering the Toolset – Part 2
  11. Best Practices
  12. Being Adaptable as a Cybersecurity Architect
  13. Architecture Considerations – Design, Development, and Other Security Strategies – Part 1
  14. Architecture Considerations – Design, Development, and Other Security Strategies – Part 2
From the B&N Reads Blog

Customer Reviews