Hands-on cybersecurity for architects plan and design robust security architectures

Hands-on cybersecurity for architects plan and design robust security architectures

Author
Aslaner, MiladRerup, Neil
Publisher
Packt Publishing
Language
English
Year
2018
Page
1 (336 pages)
ISBN
9781788830263,9781788627238,1788627237
File Type
pdf
File Size
7.5 MiB

Get acquainted with Security solutions and manage robust, highly available, and dynamic infrastructure for your oraganisation effectively. Key Features Successfully architect complex security structure with the help of practical use cases Learn network, Cloud, and connected devices risk assessment methodologies Gain complete understanding of cybersecurity architecture to implement it in medium to large enterprises Book Description
Things in the IT domain have undergone massive changes. There was a time when Cloud was referred to accumulation of vapors and bringing your own devices to work was like committing a crime. With evolving IT industry comes emerging security threats.
The main focus of the book is to make sure you successfully design and implement a complex security structure and ensure they function as expected. This book will start with the fundamentals of recent cybersecurity practices and give you a heads-up on acquiring and understanding your organisation's requirements. Then, you will be taught how to plan and design robust security architecture along with practicals use cases on performing various security assessments. Next, you will learn to design and develop key requirements like firewalls, VPNs, WANs, digital certifications and so on. Later, this book will also teach you how to integrate upcoming security changes on BYOD, Cloud platforms, Connected devices (IoT) and more. Finally, you will learn to design frequent updates and upgrades for your systems as per your Enterprise's needs.
By the end of this book, you will be able to architect robust security solutions for your infrastructure. What you will learn Get an overview of different layers in security architecture and how they are integrated along with the evolution of security architecture. Learn about various inputs into strategies followed by the development of the SWOT analysis, and organizations requirement to drive this strategy. Get a deep dive on real-world cyber-attacks that was targeted to the mail environment of an organization and then how to design and implement a secure mail service approach. Monitor the age and capacity of security tools and architecture along with growth projections and architecture strategy. Look at the trends with regards to security and what the security architect should be thinking about down the road. Who This Book Is For
If you are a security, network or a system administrator interested in taking up high-level responsibilities like designing and implementing complex security structures and modules then, this book is for you. Basic understanding of network and computer security implementation can do wonder.

show more...

How to Download?!!!

Just click on START button on Telegram Bot

Free Download Book