Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Cybersecurity Architect's Handbook
Cybersecurity Architect's Handbook

Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture

eBook
€24.99 €35.99
Paperback
€39.99 €44.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Shipping Address

Billing Address

Shipping Methods
Table of content icon View table of contents Preview book icon Preview Book

Cybersecurity Architect's Handbook

Introduction to Cybersecurity

In today’s connected world, it is hard to not hear about or unwittingly do something related to cybersecurity. Whether that is the forced password reset associated with your work user account or the notification associated with a data breach, individuals are forced to deal with cybersecurity concepts at all levels. It is for that reason, and without any surprise, that cybersecurity has become a popular career choice and one with growing demand. According to the US Bureau of Labor Statistics (https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#:~:text=Employment%20of%20information%20security%20analysts,on%20average%2C%20over%20the%20decade), there was an expected growth of 35% in cybersecurity jobs between 2021 and 2023. That is a potential of 3.5 million cybersecurity positions worldwide according to a report by Cybersecurity Ventures (https://www.esentire.com/resources/library/2023-official-cybersecurity...

What is cybersecurity?

It is no secret that there are volumes of books written on the topic of cybersecurity, some of which I have been fortunate enough to provide content for. This section is not meant to be a doctoral thesis on cybersecurity, but rather a survey to provide the baseline of information for the remaining topics of the book. As a result, I will periodically reference other material or books to provide you with the ability to do a deeper dive into certain topics to prevent this handbook from becoming a tome.

Let’s face it, depending on who you ask, you will get varying definitions of the term cybersecurity. This can range from protecting systems, networks, and programs from digital attacks, to reducing the risk level of an organization, or even calling cybersecurity by another name such as information assurance, security, or cyber, and the list could go on. The reason for the varied definitions or synonyms is it comes down to the perspective of the individual...

Confidentiality/integrity/availability

I happen to prefer CISA’s definition of cybersecurity, because it is concise and encompasses most other definitions, including my little nutshell. I also like the fact that it includes the CIA triad as the basis of the definition. No, this is not the United States’ spy agency, but rather the fundamental foundation of security. That is Confidentiality, Integrity, and Availability (CIA).

We will get to the CIA triad in more detail shortly, but consider our previous discussion about cybersecurity. How does a company maintain its business? Customers support the business because the company provides services acceptable to the customers. What happens if the business is not able to deliver on promised services or the business openly releases customer data? The business would not last long because the customers would quickly transition to competitors. In this example, the business needs to improve reliability or availability and establish...

Networking and operating systems

Ultimately, the reason for security is the protection of data at rest or in motion for a business. As such, it requires an objective analysis of the current state of the business or enterprise. The architecture, from a security perspective, is not vendor- or technology-specific but based on best practices. Likewise, it looks at the security requirements by device or technology type to meet the functionality necessary for flexibility in a changing infrastructure while implementing the most appropriate security model for the environment.

In the world of cybersecurity, networking and operating systems play a crucial role in safeguarding digital assets. This aims to provide an accessible overview of networking and operating systems within the context of cybersecurity, explaining their significance, functions, and potential vulnerabilities.

Networking fundamentals

Networking forms the foundation of modern digital communication and is essential for...

Applications

Applications play a critical role in today’s digital landscape, enabling various tasks and services on computers, smartphones, and other devices. However, they can also pose security risks if not properly designed and secured. This report aims to provide an accessible overview of applications and application security within the context of cybersecurity. The content is tailored for individuals with a high school education level to ensure understanding and comprehension.

Understanding applications

Applications, also known as software programs or apps, are computer programs designed to perform specific tasks or provide specific services. They can range from simple applications such as calculators and word processors to complex applications such as web browsers and online banking platforms. Here are key aspects related to applications.

Types of applications

Applications can be categorized into various types, including desktop applications, mobile applications...

Governance, regulations, and compliance (GRC)

In today’s complex and interconnected business environment, organizations face numerous challenges related to GRC. GRC refers to the framework and processes that organizations establish to ensure ethical conduct, adhere to laws and regulations, and mitigate risks. This topic aims to provide a comprehensive overview of GRC, explaining its key components, significance, and the role it plays in organizations. The content is presented in a manner that can be easily understood by individuals with a high school education.

Governance

Governance refers to the set of policies, processes, and procedures that guide the overall management and decision-making within an organization. It encompasses the establishment of a clear organizational structure, the definition of roles and responsibilities, and the implementation of effective oversight mechanisms. Good governance ensures that an organization operates in an ethical and transparent...

Summary

In this chapter, we discussed some of the foundational concepts around cybersecurity. This included a brief discussion that provided insights into various aspects of cybersecurity. It aimed to ensure that individuals entering into or starting a career can understand the content around the topics covered.

Highlighting the exponential growth expected in the cybersecurity field, making it an attractive career choice with numerous job opportunities, it emphasized the importance of building a strong foundation in cybersecurity and provided additional resources for further learning. The chapter delved into essential areas such as the following:

  • Cybersecurity basics: It explored the definition of cybersecurity and its significance in today’s interconnected world. This highlighted how individuals encounter cybersecurity concepts in their daily lives, emphasizing the growing demand for cybersecurity professionals.
  • CIA Triad: The CIA triad forms the foundation of...

Further reading

While formal education and training programs provide an excellent foundation, independent reading and research can greatly accelerate learning. Books allow you to immerse yourself in topics at your own pace and as deeply as you desire. They can expose you to new ideas, reinforce concepts, and inspire new directions to explore.

For technologists at any career stage, regularly reading industry books keeps knowledge sharp and perspectives current in a rapidly evolving field. Technical books help build hands-on skills with topics not covered in certifications or coursework. Books on soft skills such as leadership, communication, and career advancement provide crucial complementary knowledge.

Security professionals in particular benefit from reading across a diversity of focus areas to develop well-rounded capabilities. Books on application security, governance frameworks, incident response, secure DevOps, and other domains reveal the interconnectedness and expand...

Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Gain insights into the cybersecurity architect role and master key skills to excel in it
  • Acquire a diverse skill set for becoming a cybersecurity architect through up-to-date, practical examples
  • Discover valuable tips and best practices to launch your career in cybersecurity
  • Purchase of the print or Kindle book includes a free PDF eBook

Description

Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat; it requires both upskilling and a fundamental shift in how you view cybersecurity. Written by a seasoned cybersecurity expert with over two decades of experience spanning the public and private sectors, this all-encompassing guide outlines an accessible a path for cybersecurity engineers and newcomers to evolve into architects, sharing best practices to enhance your skills. After a brief introduction to the role and foundational concepts, this book will help you understand the day-to-day challenges faced by CSAs, supported by practical examples. You'll gain insights into assessing and improving your organization’s security posture, including system, hardware, and software security. You'll also learn how to set user and system policies and protocols through effective monitoring and enforcement, and understanding countermeasures that protect the system from unauthorized access attempts. To prepare you for the road ahead and augment your existing skills, the book provides invaluable tips and practices that will contribute to your success as a CSA. By the end of this book, you’ll be well-equipped to take up the CSA role and execute robust security solutions.

Who is this book for?

This book is for cybersecurity engineers or newcomers who aspire to become cybersecurity architects. It is also for cybersecurity professionals looking to transition into a cybersecurity architect role. Solution architects interested in understanding the scope of the role and the necessary skills for success will also find this book useful. Anyone with a basic understanding of computer and networking technologies will be able to make the most of this book.

What you will learn

  • Get to grips with the foundational concepts and basics of cybersecurity
  • Understand cybersecurity architecture principles through scenario-based examples
  • Navigate the certification landscape and understand key considerations for getting certified
  • Implement zero-trust authentication with practical examples and best practices
  • Find out how to choose commercial and open source tools
  • Address architecture challenges, focusing on mitigating threats and organizational governance
Estimated delivery fee Deliver to Malta

Premium delivery 7 - 10 business days

€32.95
(Includes tracking information)

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Mar 29, 2024
Length: 494 pages
Edition : 1st
Language : English
ISBN-13 : 9781803235844
Category :
Concepts :

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Shipping Address

Billing Address

Shipping Methods
Estimated delivery fee Deliver to Malta

Premium delivery 7 - 10 business days

€32.95
(Includes tracking information)

Product Details

Publication date : Mar 29, 2024
Length: 494 pages
Edition : 1st
Language : English
ISBN-13 : 9781803235844
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 96.97 127.97 31.00 saved
Cybersecurity Architect's Handbook
€39.99 €44.99
Solutions Architect's Handbook
€30.99 €44.99
Cybersecurity Strategies and Best Practices
€25.99 €37.99
Total 96.97 127.97 31.00 saved Stars icon
Banner background image

Table of Contents

19 Chapters
Part 1:Foundations Chevron down icon Chevron up icon
Chapter 1: Introduction to Cybersecurity Chevron down icon Chevron up icon
Chapter 2: Cybersecurity Foundation Chevron down icon Chevron up icon
Chapter 3: What Is a Cybersecurity Architect and What Are Their Responsibilities? Chevron down icon Chevron up icon
Part 2: Pathways Chevron down icon Chevron up icon
Chapter 4: Cybersecurity Architecture Principles, Design, and Analysis Chevron down icon Chevron up icon
Chapter 5: Threat, Risk, and Governance Considerations as an Architect Chevron down icon Chevron up icon
Chapter 6: Documentation as a Cybersecurity Architect – Valuable Resources and Guidance for a Cybersecurity Architect Role Chevron down icon Chevron up icon
Chapter 7: Entry-Level- to-Architect Roadmap Chevron down icon Chevron up icon
Chapter 8: The Certification Dilemma Chevron down icon Chevron up icon
Part 3: Advancements Chevron down icon Chevron up icon
Chapter 9: Decluttering the Toolset – Part 1 Chevron down icon Chevron up icon
Chapter 10: Decluttering the Toolset – Part 2 Chevron down icon Chevron up icon
Chapter 11: Best Practices Chevron down icon Chevron up icon
Chapter 12: Being Adaptable as a Cybersecurity Architect Chevron down icon Chevron up icon
Chapter 13: Architecture Considerations – Design, Development, and Other Security Strategies – Part 1 Chevron down icon Chevron up icon
Chapter 14: Architecture Considerations – Design, Development, and Other Security Strategies – Part 2 Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.4
(12 Ratings)
5 star 75%
4 star 8.3%
3 star 0%
2 star 16.7%
1 star 0%
Filter icon Filter
Top Reviews

Filter reviews by




Bear Apr 16, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
If you're looking for a comprehensive guide to the world of cybersecurity, I highly recommend this book. Its technical nature is explained in an easy-to-understand manner, and it covers various career pathways that you can explore. The labs provided in the book offer a hands-on experience that is necessary for proper comprehension. It is an insightful read that can help you elevate your understanding of cybersecurity and take your career to the next level.
Amazon Verified review Amazon
Josiah Rawlings Mar 27, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
As someone navigating the intricate world of cybersecurity, I found 'Cybersecurity Architect's Handbook' to be an indispensable companion. What sets this book apart is its ability to seamlessly guide readers from one complex topic to another in an effortlessly digestible manner. I particularly appreciated the insightful chapters on the 'Entry Level to Architect Roadmap' and 'The Certification Dilemma,' as these are often difficult to navigate aspects in our field. The author's clarity and depth of knowledge shine through, making this handbook a must-have for anyone serious about excelling in cybersecurity architecture.
Amazon Verified review Amazon
LA-Listing Jul 29, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Cybersecurity Architect’s Handbook is an indispensable guide for anyone aspiring to work as a Cybersecurity Architect. The book offers a comprehensive introduction to the role, emphasizing the essential skills and foundational concepts needed to excel. It effectively combines theory with practical, scenario-based examples, making complex topics accessible and actionable. The inclusion of best practices, certification guidance, and an exploration of both commercial and open-source tools provides readers with a well-rounded toolkit for addressing contemporary security challenges. Overall, this handbook is a must-read for cybersecurity professionals aiming to advance their careers and stay ahead in an ever-evolving field.
Amazon Verified review Amazon
Carlos and Sherrie M Jun 22, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book provides a very useful resource for all in the field of cybersecurity. Very helpful for those with businesses that have tech departments such as medical practices where security is so very important.
Amazon Verified review Amazon
rg Aug 19, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I really like this book by Lester Nichols as it covers many key areas that Cybersecurity Architects do, have done, and/or are expected to do in their role. Although there are differences where one is hands-on vs not hands-on, it is dependent on the organization and job responsibilities you are hired for. This book is packed with great advice and practical examples.The book systematically covers everything from strategic involvement to tactical to what it takes to being a successful cybersecurity architect. We deal with all sorts of challenges but at the same time need to understand the whole landscape involving both technical, non-technical, and knowing how to communicate with leadership teams. I appreciate this book covering some aspects of a hands-on approach, including labs and exercises that allow you to apply what you learn immediately.Whether you are a cybersecurity architect, a security professional, or just passionate about cybersecurity, this book will provide you with a comprehensive foundation and enhance your ability to protect your organization against ever-evolving threats. A must-read for anyone serious about strengthening their cybersecurity defenses as a path towards cybersecurity architecture.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is the delivery time and cost of print book? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela
What is custom duty/charge? Chevron down icon Chevron up icon

Customs duty are charges levied on goods when they cross international borders. It is a tax that is imposed on imported goods. These duties are charged by special authorities and bodies created by local governments and are meant to protect local industries, economies, and businesses.

Do I have to pay customs charges for the print book order? Chevron down icon Chevron up icon

The orders shipped to the countries that are listed under EU27 will not bear custom charges. They are paid by Packt as part of the order.

List of EU27 countries: www.gov.uk/eu-eea:

A custom duty or localized taxes may be applicable on the shipment and would be charged by the recipient country outside of the EU27 which should be paid by the customer and these duties are not included in the shipping charges been charged on the order.

How do I know my custom duty charges? Chevron down icon Chevron up icon

The amount of duty payable varies greatly depending on the imported goods, the country of origin and several other factors like the total invoice amount or dimensions like weight, and other such criteria applicable in your country.

For example:

  • If you live in Mexico, and the declared value of your ordered items is over $ 50, for you to receive a package, you will have to pay additional import tax of 19% which will be $ 9.50 to the courier service.
  • Whereas if you live in Turkey, and the declared value of your ordered items is over € 22, for you to receive a package, you will have to pay additional import tax of 18% which will be € 3.96 to the courier service.
How can I cancel my order? Chevron down icon Chevron up icon

Cancellation Policy for Published Printed Books:

You can cancel any order within 1 hour of placing the order. Simply contact [email protected] with your order details or payment transaction id. If your order has already started the shipment process, we will do our best to stop it. However, if it is already on the way to you then when you receive it, you can contact us at [email protected] using the returns and refund process.

Please understand that Packt Publishing cannot provide refunds or cancel any order except for the cases described in our Return Policy (i.e. Packt Publishing agrees to replace your printed book because it arrives damaged or material defect in book), Packt Publishing will not accept returns.

What is your returns and refunds policy? Chevron down icon Chevron up icon

Return Policy:

We want you to be happy with your purchase from Packtpub.com. We will not hassle you with returning print books to us. If the print book you receive from us is incorrect, damaged, doesn't work or is unacceptably late, please contact Customer Relations Team on [email protected] with the order number and issue details as explained below:

  1. If you ordered (eBook, Video or Print Book) incorrectly or accidentally, please contact Customer Relations Team on [email protected] within one hour of placing the order and we will replace/refund you the item cost.
  2. Sadly, if your eBook or Video file is faulty or a fault occurs during the eBook or Video being made available to you, i.e. during download then you should contact Customer Relations Team within 14 days of purchase on [email protected] who will be able to resolve this issue for you.
  3. You will have a choice of replacement or refund of the problem items.(damaged, defective or incorrect)
  4. Once Customer Care Team confirms that you will be refunded, you should receive the refund within 10 to 12 working days.
  5. If you are only requesting a refund of one book from a multiple order, then we will refund you the appropriate single item.
  6. Where the items were shipped under a free shipping offer, there will be no shipping costs to refund.

On the off chance your printed book arrives damaged, with book material defect, contact our Customer Relation Team on [email protected] within 14 days of receipt of the book with appropriate evidence of damage and we will work with you to secure a replacement copy, if necessary. Please note that each printed book you order from us is individually made by Packt's professional book-printing partner which is on a print-on-demand basis.

What tax is charged? Chevron down icon Chevron up icon

Currently, no tax is charged on the purchase of any print book (subject to change based on the laws and regulations). A localized VAT fee is charged only to our European and UK customers on eBooks, Video and subscriptions that they buy. GST is charged to Indian customers for eBooks and video purchases.

What payment methods can I use? Chevron down icon Chevron up icon

You can pay with the following card types:

  1. Visa Debit
  2. Visa Credit
  3. MasterCard
  4. PayPal
What is the delivery time and cost of print books? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela