Cybersecurity Architect's Handbook An End-To-end Guide to Implementing and Maintaining Robust Security Architecture.

Book Cover
Average Rating
Published
Birmingham : Packt Publishing, Limited, 2024.
Status
Available Online

Description

Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implementing and maintaining robust security structures for the ever-evolving digital landscape Key Features Gain insights into the cybersecurity architect role and master key skills to excel in it Acquire a diverse skill set for becoming a cybersecurity architect through up-to-date, practical examples Discover valuable tips and best practices to launch your career in cybersecurity Purchase of the print or Kindle book includes a free PDF eBook Book Description Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat, as it requires both upskilling and a fundamental shift in the way you view cybersecurity altogether. Cybersecurity Architect's Handbook is an all-encompassing guide, introducing the essential skills for aspiring CSAs, outlining a path for cybersecurity engineers and newcomers to evolve into architects, and sharing best practices to enhance the skills of existing CSAs. Following a brief introduction to the role and foundational concepts, this book will help you understand the day-to-day challenges faced by CSAs, supported by practical examples. You'll gain insights into assessing and improving your organization's security posture, concerning system, hardware, and software security. You'll also get to grips with setting user and system policies and protocols through effective monitoring and enforcement, along with understanding countermeasures that protect the system from unauthorized access attempts. To prepare you for the road ahead and augment your existing skills, the book provides invaluable tips and practices that will contribute to your success as a CSA. By the end of this book, you'll be well-equipped to take up the CSA role and execute robust security solutions. What you will learn Get to grips with the foundational concepts and basics of cybersecurity Understand cybersecurity architecture principles through scenario-based examples Navigate the certification landscape and understand key considerations for getting certified Implement zero-trust authentication with practical examples and best practices Find out how to choose commercial and open source tools Address architecture challenges, focusing on mitigating threats and organizational governance Who this book is for This book is for cybersecurity professionals looking to transition into a cybersecurity architect role. Solution architects interested in understanding the scope of the role and the necessary skills for success will also find this book useful.

More Details

Format
Language
English
ISBN
1803239891, 9781803239897

Notes

General Note
Description based upon print version of record.
General Note
Scope of vision
Description
Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implementing and maintaining robust security structures for the ever-evolving digital landscape Key Features Gain insights into the cybersecurity architect role and master key skills to excel in it Acquire a diverse skill set for becoming a cybersecurity architect through up-to-date, practical examples Discover valuable tips and best practices to launch your career in cybersecurity Purchase of the print or Kindle book includes a free PDF eBook Book Description Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat, as it requires both upskilling and a fundamental shift in the way you view cybersecurity altogether. Cybersecurity Architect's Handbook is an all-encompassing guide, introducing the essential skills for aspiring CSAs, outlining a path for cybersecurity engineers and newcomers to evolve into architects, and sharing best practices to enhance the skills of existing CSAs. Following a brief introduction to the role and foundational concepts, this book will help you understand the day-to-day challenges faced by CSAs, supported by practical examples. You'll gain insights into assessing and improving your organization's security posture, concerning system, hardware, and software security. You'll also get to grips with setting user and system policies and protocols through effective monitoring and enforcement, along with understanding countermeasures that protect the system from unauthorized access attempts. To prepare you for the road ahead and augment your existing skills, the book provides invaluable tips and practices that will contribute to your success as a CSA. By the end of this book, you'll be well-equipped to take up the CSA role and execute robust security solutions. What you will learn Get to grips with the foundational concepts and basics of cybersecurity Understand cybersecurity architecture principles through scenario-based examples Navigate the certification landscape and understand key considerations for getting certified Implement zero-trust authentication with practical examples and best practices Find out how to choose commercial and open source tools Address architecture challenges, focusing on mitigating threats and organizational governance Who this book is for This book is for cybersecurity professionals looking to transition into a cybersecurity architect role. Solution architects interested in understanding the scope of the role and the necessary skills for success will also find this book useful.
Local note
O'Reilly O'Reilly Online Learning: Academic/Public Library Edition

Table of Contents

Cover
Title Page
Copyright and Credit
Dedicated
Contributors
Table of Contents
Preface
Part 1: Foundations
Chapter 1: Introduction to Cybersecurity
What is cybersecurity?
Access control
Secure software development
Business continuity planning/disaster recovery (BCP/DR)
Cryptography
Information security governance/risk management
Legal/regulatory/compliance and investigations
Security operations
Physical and environmental security
Security architecture
Telecommunications/network security
Confidentiality/integrity/availability
Confidentiality
Integrity
Availability
Non-repudiation
Networking and operating systems
Networking fundamentals
Operating systems in cybersecurity
Cybersecurity considerations for networking and operating systems
Applications
Understanding applications
Importance of application security
Common application security challenges
Secure development life cycle
Governance, regulations, and compliance (GRC)
Governance
Regulations
Compliance
The role of GRC in organizations
Summary
Further reading
Chapter 2: Cybersecurity Foundation
Access control
Access control fundamentals
Aligning access control with the business
Collaboration with operational teams
Examples of how you can implement access control measures within an enterprise
Access control lab
Network and communication security
Network security fundamentals
Network security technologies
Securing network communications
Network access control
Collaboration with operational teams
Network security lab
Cryptography
Cryptography fundamentals
Cryptography in practice
Collaboration with business and operational teams
Cryptography lab
BCP/DRP
BCP
DRP
Integration with risk management and security
Compliance and regulatory considerations
BCP/DRP lab
Physical security
Access control
Surveillance systems
Intrusion detection and alarm systems
Physical barriers and deterrents
Security personnel and guards
Security policies and procedures
Incident response and emergency preparedness
Environmental controls
Inventory and asset management
Perimeter security
Collaboration with law enforcement and first responders
Physical security audits and assessments
Why implement physical security controls?
Physical security lab
Summary
Chapter 3: What Is a Cybersecurity Architect and What Are Their Responsibilities?
Understanding the role and environment
What is a cybersecurity architect?
Areas of focus
Threat landscape analysis and modeling
Security framework development
Network security
Application security
Cloud security
Mobile security
Vendor and third-party risk management
Emerging technologies evaluation
Other areas of focus
Cybersecurity architect as a part of the bigger team
Responsibilities

Discover More

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Nichols, L. (2024). Cybersecurity Architect's Handbook: An End-To-end Guide to Implementing and Maintaining Robust Security Architecture . Packt Publishing, Limited.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Nichols, Lester. 2024. Cybersecurity Architect's Handbook: An End-To-end Guide to Implementing and Maintaining Robust Security Architecture. Birmingham: Packt Publishing, Limited.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Nichols, Lester. Cybersecurity Architect's Handbook: An End-To-end Guide to Implementing and Maintaining Robust Security Architecture Birmingham: Packt Publishing, Limited, 2024.

Harvard Citation (style guide)

Nichols, L. (2024). Cybersecurity architect's handbook: an end-to-end guide to implementing and maintaining robust security architecture. Birmingham: Packt Publishing, Limited.

MLA Citation, 9th Edition (style guide)

Nichols, Lester. Cybersecurity Architect's Handbook: An End-To-end Guide to Implementing and Maintaining Robust Security Architecture Packt Publishing, Limited, 2024.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
de91662b-5f9d-6e9b-e526-706bebf59b8f-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work IDde91662b-5f9d-6e9b-e526-706bebf59b8f-eng
Full titlecybersecurity architects handbook an end to end guide to implementing and maintaining robust security architecture
Authornichols lester
Grouping Categorybook
Last Update2025-01-24 12:33:29PM
Last Indexed2025-05-03 03:36:30AM

Book Cover Information

Image Sourcedefault
First LoadedJan 22, 2025
Last UsedMay 8, 2025

Marc Record

First DetectedDec 16, 2024 11:29:56 PM
Last File Modification TimeDec 17, 2024 08:29:07 AM
SuppressedRecord had no items

MARC Record

LEADER07368cam a22004817a 4500
001on1424748395
003OCoLC
00520241217082633.0
006m     o  d        
007cr cnu||||||||
008240302s2024    xx      o     ||| 0 eng d
019 |a 1424727539|a 1426863579
020 |a 1803239891
020 |a 9781803239897|q (electronic bk.)
035 |a (OCoLC)1424748395|z (OCoLC)1424727539|z (OCoLC)1426863579
037 |a 9781803235844|b O'Reilly Media
040 |a EBLCP|b eng|c EBLCP|d YDX|d N$T|d OCLCO|d ORMDA|d UKAHL
049 |a MAIN
050 4|a QA76.9.A25
08204|a 005.8|2 23/eng/20240318
1001 |a Nichols, Lester.
24510|a Cybersecurity Architect's Handbook|h [electronic resource] :|b An End-To-end Guide to Implementing and Maintaining Robust Security Architecture.
260 |a Birmingham :|b Packt Publishing, Limited,|c 2024.
300 |a 1 online resource (494 p.)
500 |a Description based upon print version of record.
500 |a Scope of vision
5050 |a Cover -- Title Page -- Copyright and Credit -- Dedicated -- Contributors -- Table of Contents -- Preface -- Part 1: Foundations -- Chapter 1: Introduction to Cybersecurity -- What is cybersecurity? -- Access control -- Secure software development -- Business continuity planning/disaster recovery (BCP/DR) -- Cryptography -- Information security governance/risk management -- Legal/regulatory/compliance and investigations -- Security operations -- Physical and environmental security -- Security architecture -- Telecommunications/network security -- Confidentiality/integrity/availability
5058 |a Confidentiality -- Integrity -- Availability -- Non-repudiation -- Networking and operating systems -- Networking fundamentals -- Operating systems in cybersecurity -- Cybersecurity considerations for networking and operating systems -- Applications -- Understanding applications -- Importance of application security -- Common application security challenges -- Secure development life cycle -- Governance, regulations, and compliance (GRC) -- Governance -- Regulations -- Compliance -- The role of GRC in organizations -- Summary -- Further reading -- Chapter 2: Cybersecurity Foundation
5058 |a Access control -- Access control fundamentals -- Aligning access control with the business -- Collaboration with operational teams -- Examples of how you can implement access control measures within an enterprise -- Access control lab -- Network and communication security -- Network security fundamentals -- Network security technologies -- Securing network communications -- Network access control -- Collaboration with operational teams -- Network security lab -- Cryptography -- Cryptography fundamentals -- Cryptography in practice -- Collaboration with business and operational teams
5058 |a Cryptography lab -- BCP/DRP -- BCP -- DRP -- Integration with risk management and security -- Compliance and regulatory considerations -- BCP/DRP lab -- Physical security -- Access control -- Surveillance systems -- Intrusion detection and alarm systems -- Physical barriers and deterrents -- Security personnel and guards -- Security policies and procedures -- Incident response and emergency preparedness -- Environmental controls -- Inventory and asset management -- Perimeter security -- Collaboration with law enforcement and first responders -- Physical security audits and assessments
5058 |a Why implement physical security controls? -- Physical security lab -- Summary -- Chapter 3: What Is a Cybersecurity Architect and What Are Their Responsibilities? -- Understanding the role and environment -- What is a cybersecurity architect? -- Areas of focus -- Threat landscape analysis and modeling -- Security framework development -- Network security -- Application security -- Cloud security -- Mobile security -- Vendor and third-party risk management -- Emerging technologies evaluation -- Other areas of focus -- Cybersecurity architect as a part of the bigger team -- Responsibilities
520 |a Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implementing and maintaining robust security structures for the ever-evolving digital landscape Key Features Gain insights into the cybersecurity architect role and master key skills to excel in it Acquire a diverse skill set for becoming a cybersecurity architect through up-to-date, practical examples Discover valuable tips and best practices to launch your career in cybersecurity Purchase of the print or Kindle book includes a free PDF eBook Book Description Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat, as it requires both upskilling and a fundamental shift in the way you view cybersecurity altogether. Cybersecurity Architect's Handbook is an all-encompassing guide, introducing the essential skills for aspiring CSAs, outlining a path for cybersecurity engineers and newcomers to evolve into architects, and sharing best practices to enhance the skills of existing CSAs. Following a brief introduction to the role and foundational concepts, this book will help you understand the day-to-day challenges faced by CSAs, supported by practical examples. You'll gain insights into assessing and improving your organization's security posture, concerning system, hardware, and software security. You'll also get to grips with setting user and system policies and protocols through effective monitoring and enforcement, along with understanding countermeasures that protect the system from unauthorized access attempts. To prepare you for the road ahead and augment your existing skills, the book provides invaluable tips and practices that will contribute to your success as a CSA. By the end of this book, you'll be well-equipped to take up the CSA role and execute robust security solutions. What you will learn Get to grips with the foundational concepts and basics of cybersecurity Understand cybersecurity architecture principles through scenario-based examples Navigate the certification landscape and understand key considerations for getting certified Implement zero-trust authentication with practical examples and best practices Find out how to choose commercial and open source tools Address architecture challenges, focusing on mitigating threats and organizational governance Who this book is for This book is for cybersecurity professionals looking to transition into a cybersecurity architect role. Solution architects interested in understanding the scope of the role and the necessary skills for success will also find this book useful.
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Computer security.|9 65527
650 0|a Computer architecture.|9 34180
77608|i Print version:|a Nichols, Lester|t Cybersecurity Architect's Handbook|d Birmingham : Packt Publishing, Limited,c2024
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781803235844/?ar|x O'Reilly|z eBook
938 |a Askews and Holts Library Services|b ASKH|n BDZ0050903037
938 |a ProQuest Ebook Central|b EBLB|n EBL31181991
938 |a YBP Library Services|b YANK|n 20875497
938 |a EBSCOhost|b EBSC|n 3820137
994 |a 92|b VIA
999 |c 360632|d 360632