This is the code repository for Cybersecurity Architect’s Handbook, published by Packt.
An end-to-end guide to implementing and maintaining robust security architecture
This Cybersecurity Architect's Handbook is the roadmap to launching your career in cybersecurity, covering advanced strategies for designing, implementing, and maintaining comprehensive security architectures in on-premises and cloud environments.
This book covers the following exciting features:
- Get to grips with the foundational concepts and basics of cybersecurity
- Understand cybersecurity architecture principles through scenario-based examples
- Navigate the certification landscape and understand key considerations for getting certified
- Implement zero-trust authentication with practical examples and best practices
- Find out how to choose commercial and open source tools
- Address architecture challenges, focusing on mitigating threats and organizational governance
If you feel this book is for you, get your copy today!
All of the code is organized into folders. For example, Chapter02.
The code will look like the following:
{
"v": "1",
"type": {
"name": "pipeline_rule",
"version": "1"
},
Following is what you need for this book: This book is for cybersecurity professionals looking to transition into a cybersecurity architect role. Solution architects interested in understanding the scope of the role and the necessary skills for success will also find this book useful.
With the following software and hardware list you can run all code files present in the book (Chapter 1-14).
Chapter | Software required | OS required |
---|---|---|
1-14 | Kali Linux | Windows, Mac OS X, and Linux (Any) |
1-14 | Snort | Windows, Mac OS X, and Linux (Any) |
1-14 | OPNsense | Windows, Mac OS X, and Linux (Any) |
1-14 | Ansible | Windows, Mac OS X, and Linux (Any) |
1-14 | Graylog | Windows, Mac OS X, and Linux (Any) |
1-14 | Veracrypt | Windows, Mac OS X, and Linux (Any) |
1-14 | OpenVAS/Greenbone | Windows, Mac OS X, and Linux (Any) |
1-14 | AWS | Windows, Mac OS X, and Linux (Any) |
1-14 | StackStorm | Windows, Mac OS X, and Linux (Any) |
1-14 | SecurityOnion | Windows, Mac OS X, and Linux (Any) |
1-14 | ClamAV | Windows, Mac OS X, and Linux (Any) |
1-14 | OWASP ZAP and Threat Dragon | Windows, Mac OS X, and Linux (Any) |
1-14 | Microsoft Threat Modeling Tool | Windows, Mac OS X, and Linux (Any) |
Lester E. Nichols III currently resides in North Texas and is the Director Security Architecture/VP Cybersecurity Operations at JPMorgan Chase & Co. Previous experience includes the Director of IT Infrastructure and Security for a development company, SOC oversight manager/Senior Infrastructure Officer within DHS and previous experience in Local/Federal/DoD/financial sectors. Lester has post graduate education with a Master’s of Science Degree in Information Assurance from Norwich University, the oldest private military school in the United States, and multiple industry certifications including CISSP and SANS certs, as well as others. Lester is also a contributing author to the Computer Security Handbook 5th-6th Editions by Wiley Press.