SALE ON NOW! PROMOTIONS

Close Notification

Your cart does not contain any items

The Complete Guide to Defense in Depth

Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach...

Akash Mukherjee Jason D. Clinton

$91.95   $78.05

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Packt Publishing Limited
31 July 2024
Gain comprehensive insights to safeguard your systems against advanced threats and maintain resilient security posture

Key Features

Develop a comprehensive understanding of advanced defense strategies to shape robust security programs Evaluate the effectiveness of a security strategy through the lens of Defense in Depth principles Understand the attacker mindset to deploy solutions that protect your organization from emerging threats Purchase of the print or Kindle book includes a free PDF eBook

Book DescriptionIn an era of relentless cyber threats, organizations face daunting challenges in fortifying their defenses against increasingly sophisticated attacks. The Complete Guide to Defense in Depth offers a comprehensive roadmap to navigating the complex landscape, empowering you to master the art of layered security. This book starts by laying the groundwork, delving into risk navigation, asset classification, and threat identification, helping you establish a robust framework for layered security. It gradually transforms you into an adept strategist, providing insights into the attacker's mindset, revealing vulnerabilities from an adversarial perspective, and guiding the creation of a proactive defense strategy through meticulous mapping of attack vectors. Toward the end, the book addresses the ever-evolving threat landscape, exploring emerging dangers and emphasizing the crucial human factor in security awareness and training. This book also illustrates how Defense in Depth serves as a dynamic, adaptable approach to cybersecurity. By the end of this book, you’ll have gained a profound understanding of the significance of multi-layered defense strategies, explored frameworks for building robust security programs, and developed the ability to navigate the evolving threat landscape with resilience and agility.

What you will learn

Understand the core tenets of Defense in Depth, its principles, and best practices Gain insights into evolving security threats and adapting defense strategies Master the art of crafting a layered security strategy Discover techniques for designing robust and resilient systems Apply Defense in Depth principles to cloud-based environments Understand the principles of Zero Trust security architecture Cultivate a security-conscious culture within organizations Get up to speed with the intricacies of Defense in Depth for regulatory compliance standards

Who this book is forThis book is for security engineers, security analysts, and security managers who are focused on secure design and Defense in Depth. Business leaders and software developers who want to build a security mindset will also find this book valuable. Additionally, students and aspiring security professionals looking to learn holistic security strategies will benefit from the book. This book doesn’t assume any prior knowledge and explains all the fundamental concepts. However, experience in the security industry and awareness of common terms will be helpful.
By:  
Foreword by:  
Imprint:   Packt Publishing Limited
Country of Publication:   United Kingdom
Dimensions:   Height: 235mm,  Width: 191mm, 
ISBN:   9781835468265
ISBN 10:   1835468268
Pages:   298
Publication Date:  
Audience:   General/trade ,  ELT Advanced
Format:   Paperback
Publisher's Status:   Active

Akash Mukherjee is a security enthusiast and a leader with experience setting up and executing security strategies at large tech companies. He is currently a security leader at Apple AIML. He was previously a security lead at Google, leading the insider risk program and supply chain security efforts at Google Chrome. During his time at Google, Akash was also a course lead and subject matter expert for the Google Cybersecurity Certificate course. He has been at the forefront of the emerging threat landscape and has led the development of novel security strategies and frameworks. Akash was one of the co-developers of the open-source Supply-chain Levels for Soft ware Artifacts (SLSA) framework. He is based in the Silicon Valley area in the US, and he holds a bachelor of technology degree from the Indian Institute of Technology, B.H.U., India, and a master's degree in cyber security from the University of Southern California, USA.

See Also