Hands-On Cybersecurity for Architects

Hands-On Cybersecurity for Architects

English | 2018 | ISBN: 978-1788830263 | 346 Pages | PDF, EPUB | 10 MB

Hands-On Cybersecurity for Architects: Plan and design robust security architectures
Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization
Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging security approaches.
Hands-On Cybersecurity for Architects will help you to successfully design, integrate, and implement complex security structures in any solution whilst ensuring that the solution functions as expected. To start with, you will get to grips with the fundamentals of recent cybersecurity practices, followed by acquiring and understanding your organization’s requirements. You will then move on to learning how to plan and design robust security architectures, along with practical approaches to performing various security assessments. Once you have grasped all this, you will learn to design and develop key requirements, such as firewalls, virtual private networks (VPNs), wide area networks (WANs), and digital certifications. In addition to this, you will discover how to integrate upcoming security changes on Bring your own device (BYOD), cloud platforms, and the Internet of Things (IoT), among others. Finally, you will explore how to design frequent updates and upgrades for your systems as per your enterprise’s needs.
By the end of this book, you will be able to architect solutions with robust security components for your infrastructure.
What you will learn

  • Understand different security architecture layers and their integration with all solutions
  • Study SWOT analysis and dig into your organization’s requirements to drive the strategy
  • Design and implement a secure email service approach
  • Monitor the age and capacity of security tools and architecture
  • Explore growth projections and architecture strategy
  • Identify trends, as well as what a security architect should take into consideration
Homepage