Essential Books For Learning About Cyber Security

The cyber security industry and all of the threats and dangers involved within it, is enough to write a best-selling Sci-Fi/ horror novel, though unfortunately, the reality is these things are all too real, and the threats exist outside of the pages of the book.
 
Acora have listed some essential reading for those who want to be clued up on the world of cyber security, and the ways you can ensure you are prepared for any mishaps, but also to ensure you have the technical skills to find the areas of vulnerability and avoid disaster in the first place.
 
1. Advanced penetration testing by Wil Allsopp
 
Performing hacking and penetration tests for Fortune 100 companies worldwide teaches you a thing or two, and so Will Allsopp created Advanced penetration Testing: Hacking The World’s Most Secure Networks to provide guidance and in depth information on all you need to know about techniques for targeting and compromising high security connections that aren't taught in any certification or covered by most of the common defense scanners. From discovering and creating attack vectors, employing social engineering tactics to create an initial compromise and using advanced methods for escalating privilege, this book has everything needed to really get to grips with the nitty gritty of penetration testing.
 
Link to buy ‘Advanced penetration testing” on Amazon here.
 
2. The Hacker Playbook 2: Practical Guide to Penetration Testing by Peter Kim
 
Professional athletes don’t turn up unprepared and without a plan, and neither should IT professionals or security researchers. This straight forward guide provides a more practical approach to various aspects of penetration testing including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. Written by a highly skilled security professional and CEO of Secure Planet Ltd. If you’re looking to further improve your skills, this hands-on guide will get you there.
 
Link to buy ‘The Hacker Playbook 2: Practical Guide to Penetration Testing.
 
 
3. Hacking: The Art of Exploitation by Jon Erickson
 
This book dives into the world of problem solving and exploitation and provides a much more holistic view of programming, network communications and current hacking techniques. This book also comes with a live CD to allow you to create a safe linux environment to delve into the nitty gritty of programming and debugging code, without compromising the security of your own operating system. 
 
Link to buy Hacking: The Art of Exploitation
 
4. The Art of Invisibility: The World’s Most Famous Hacker Teaches You How To Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick
 
Many people like to describe themselves as hackers but few have the ability and strong technical foundation needed to really push the boundaries. A book to be read by even those not looking to improve technical knowledge, but more so by those interested in the modern-day world, and the invisible threats often ignored or dismissed online. Using a step-by-step instruction format, the author, Jon Erikson, aims to teach everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. 
 
Link to buy The Art of Invisibility: The World’s Most Famous Hacker Teachers you How To Be Safe in the Age of Big Brother and Big Data
 
5. Ghost in the wires: My Adventures as the World’s Most Wanted Hacker by Kevin Mitnick
 
Kevin Mitnick can proudly say he’s written several well-respected books surrounding cyber security, however not all with reviews quite as positive as this one. A memoir of his time as an IT worker dealing with the FBI, the book primarily focuses on coding, and is as much an educational read as it is a thriller. Something that can’t be said for the majority of IT related reading material.
 
 Link to buy Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
 
You Might Also Read: 
 
The Cyberthreat Handbook:
 
 
 
« Australia's Cyber Security Plan Includes Domestic Surveillance
Google Bans Ads Linking To Hacked Political Content »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

CyberScout

CyberScout

Cyberscout delivers the latest cybersecurity education, protection and resolutions services. We also provide swift incident response services around the world.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

SDG Corp

SDG Corp

SDG is a global cybersecurity, identity governance, risk consulting and advisory firm, addressing complex security, compliance and technology needs.

Sprint Networks

Sprint Networks

Sprint Networks is a trusted compliance and risk program advisor which deliver cost-effective technology to reduce enterprise-wide risk.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

SecureOps

SecureOps

SecureOps is transforming the Managed Security Service Provider industry by providing tailored cybersecurity solutions proven to protect organizations from cyberattacks.

Aunalytics

Aunalytics

Aunalytics is a data platform company that delivers insights as a service to answer your most important IT and business questions.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

InfoSec Brigade

InfoSec Brigade

InfoSec Brigade offers a suite of specialized solutions that help businesses to mitigate risk by integrating cyber and IT security protocols with business goals.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.