Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Cybersecurity for Architects: Plan and design robust security architectures


Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any architecture solution
  • Implement cybersecurity architecture in various enterprises

Book Description

Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging security approaches.

Hands-On Cybersecurity for Architects will help you to successfully design, integrate, and implement complex security structures in any solution whilst ensuring that the solution functions as expected. To start with, you will get to grips with the fundamentals of recent cybersecurity practices, followed by acquiring and understanding your organization's requirements. You will then move on to learning how to plan and design robust security architectures, along with practical approaches to performing various security assessments. Once you have grasped all this, you will learn to design and develop key requirements, such as firewalls, virtual private networks (VPNs), wide area networks (WANs), and digital certifications. In addition to this, you will discover how to integrate upcoming security changes on Bring your own device (BYOD), cloud platforms, and the Internet of Things (IoT), among others. Finally, you will explore how to design frequent updates and upgrades for your systems as per your enterprise's needs.

By the end of this book, you will be able to architect solutions with robust security components for your infrastructure.

What you will learn

  • Understand different security architecture layers and their integration with all solutions
  • Study SWOT analysis and dig into your organization’s requirements to drive the strategy
  • Design and implement a secure email service approach
  • Monitor the age and capacity of security tools and architecture
  • Explore growth projections and architecture strategy
  • Identify trends, as well as what a security architect should take into consideration

Who this book is for

Hands-On Cybersecurity for Architects is for you if you are a security, network, or system administrator interested in taking on more complex responsibilities such as designing and implementing complex security structures. Basic understanding of network and computer security implementation will be helpful. This book is also ideal for non-security architects who want to understand how to integrate security into their solutions.

Table of Contents

  1. Security Architecture History and Overview
  2. Security Governance
  3. Reference Security Architecture
  4. Cybersecurity Architecture Strategy
  5. Program and Strategy Level Work Artifacts
  6. Security Architecture in Waterfall Projects
  7. Security Architecture Project Delivery Artifacts
  8. Architecture Design Document
  9. Security Architecture and Operations
  10. Practical Security Architecture Designs
  11. Trends in Security Architecture Technology
  12. The Future of Security Architecture
  13. Assessments
(HTML tags aren't allowed.)

Informal Ethnic Entrepreneurship: Future Research Paradigms for Creating Innovative Business Activity
Informal Ethnic Entrepreneurship: Future Research Paradigms for Creating Innovative Business Activity

This book presents a curated collection of research on ethnic entrepreneurship, focusing on the informal sector. The common theme of the expert contributions is that entrepreneurial motivation to start informal business is paramount to ethnic groups. In particular, the book explores the factors influencing ethnic groups to start...

Playing with Videogames
Playing with Videogames
This book enlarges the discussion of mobility from tools and technologies to employees working in multiple places and between them Matti Vartiainen (Helsinki University of Technology, Finland)

Playing with Videogames documents the richly productive, playful and social cultures of videogaming that support, surround and sustain
Analytical Similarity Assessment in Biosimilar Product Development
Analytical Similarity Assessment in Biosimilar Product Development
Biologic drug products are therapeutic moieties that are manufactured using a living system or organism. These are important life-saving drug products for patients with unmet medical needs. They also comprise a growing segment in the pharmaceutical industry. In 2007, worldwide sales of biological products reached...

The Secrets of College Success (Professors' Guide)
The Secrets of College Success (Professors' Guide)

If you’re currently a college student, or plan on being one, you need to check out this book. Written by award-winning professors Lynn Jacobs and Jeremy Hyman, it’s loaded with insider information that only professors know--but few are willing to reveal. The over 600 tips in this book will show you:

  • How to pick...
Instant Kali Linux
Instant Kali Linux

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...

Uncertain Schema Matching (Synthesis Lectures on Data Management)
Uncertain Schema Matching (Synthesis Lectures on Data Management)
Schema matching is the task of providing correspondences between concepts describing the meaning of data in various heterogeneous, distributed data sources. Schema matching is one of the basic operations required by the process of data and schema integration, and thus has great effect on its outcomes. Schema matching research has...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy