Skip to content

PacktPublishing/Cybersecurity-Architects-Handbook

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Cybersecurity Architect’s Handbook

Cybersecurity Architect’s Handbook

This is the code repository for Cybersecurity Architect’s Handbook, published by Packt.

An end-to-end guide to implementing and maintaining robust security architecture

What is this book about?

This Cybersecurity Architect's Handbook is the roadmap to launching your career in cybersecurity, covering advanced strategies for designing, implementing, and maintaining comprehensive security architectures in on-premises and cloud environments.

This book covers the following exciting features:

  • Get to grips with the foundational concepts and basics of cybersecurity
  • Understand cybersecurity architecture principles through scenario-based examples
  • Navigate the certification landscape and understand key considerations for getting certified
  • Implement zero-trust authentication with practical examples and best practices
  • Find out how to choose commercial and open source tools
  • Address architecture challenges, focusing on mitigating threats and organizational governance

If you feel this book is for you, get your copy today!

https://www.packtpub.com/

Instructions and Navigations

All of the code is organized into folders. For example, Chapter02.

The code will look like the following:

{
"v": "1",
"type": {
"name": "pipeline_rule",
"version": "1"
},

Following is what you need for this book: This book is for cybersecurity professionals looking to transition into a cybersecurity architect role. Solution architects interested in understanding the scope of the role and the necessary skills for success will also find this book useful.

With the following software and hardware list you can run all code files present in the book (Chapter 1-14).

Software and Hardware List

Chapter Software required OS required
1-14 Kali Linux Windows, Mac OS X, and Linux (Any)
1-14 Snort Windows, Mac OS X, and Linux (Any)
1-14 OPNsense Windows, Mac OS X, and Linux (Any)
1-14 Ansible Windows, Mac OS X, and Linux (Any)
1-14 Graylog Windows, Mac OS X, and Linux (Any)
1-14 Veracrypt Windows, Mac OS X, and Linux (Any)
1-14 OpenVAS/Greenbone Windows, Mac OS X, and Linux (Any)
1-14 AWS Windows, Mac OS X, and Linux (Any)
1-14 StackStorm Windows, Mac OS X, and Linux (Any)
1-14 SecurityOnion Windows, Mac OS X, and Linux (Any)
1-14 ClamAV Windows, Mac OS X, and Linux (Any)
1-14 OWASP ZAP and Threat Dragon Windows, Mac OS X, and Linux (Any)
1-14 Microsoft Threat Modeling Tool Windows, Mac OS X, and Linux (Any)

Related products

Get to Know the Author

Lester E. Nichols III currently resides in North Texas and is the Director Security Architecture/VP Cybersecurity Operations at JPMorgan Chase & Co. Previous experience includes the Director of IT Infrastructure and Security for a development company, SOC oversight manager/Senior Infrastructure Officer within DHS and previous experience in Local/Federal/DoD/financial sectors. Lester has post graduate education with a Master’s of Science Degree in Information Assurance from Norwich University, the oldest private military school in the United States, and multiple industry certifications including CISSP and SANS certs, as well as others. Lester is also a contributing author to the Computer Security Handbook 5th-6th Editions by Wiley Press.

About

Cybersecurity Architects Handbook, published by Packt

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published