Essential Books For Learning About Cyber Security

The cyber security industry and all of the threats and dangers involved within it, is enough to write a best-selling Sci-Fi/ horror novel, though unfortunately, the reality is these things are all too real, and the threats exist outside of the pages of the book.
 
Acora have listed some essential reading for those who want to be clued up on the world of cyber security, and the ways you can ensure you are prepared for any mishaps, but also to ensure you have the technical skills to find the areas of vulnerability and avoid disaster in the first place.
 
1. Advanced penetration testing by Wil Allsopp
 
Performing hacking and penetration tests for Fortune 100 companies worldwide teaches you a thing or two, and so Will Allsopp created Advanced penetration Testing: Hacking The World’s Most Secure Networks to provide guidance and in depth information on all you need to know about techniques for targeting and compromising high security connections that aren't taught in any certification or covered by most of the common defense scanners. From discovering and creating attack vectors, employing social engineering tactics to create an initial compromise and using advanced methods for escalating privilege, this book has everything needed to really get to grips with the nitty gritty of penetration testing.
 
Link to buy ‘Advanced penetration testing” on Amazon here.
 
2. The Hacker Playbook 2: Practical Guide to Penetration Testing by Peter Kim
 
Professional athletes don’t turn up unprepared and without a plan, and neither should IT professionals or security researchers. This straight forward guide provides a more practical approach to various aspects of penetration testing including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. Written by a highly skilled security professional and CEO of Secure Planet Ltd. If you’re looking to further improve your skills, this hands-on guide will get you there.
 
Link to buy ‘The Hacker Playbook 2: Practical Guide to Penetration Testing.
 
 
3. Hacking: The Art of Exploitation by Jon Erickson
 
This book dives into the world of problem solving and exploitation and provides a much more holistic view of programming, network communications and current hacking techniques. This book also comes with a live CD to allow you to create a safe linux environment to delve into the nitty gritty of programming and debugging code, without compromising the security of your own operating system. 
 
Link to buy Hacking: The Art of Exploitation
 
4. The Art of Invisibility: The World’s Most Famous Hacker Teaches You How To Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick
 
Many people like to describe themselves as hackers but few have the ability and strong technical foundation needed to really push the boundaries. A book to be read by even those not looking to improve technical knowledge, but more so by those interested in the modern-day world, and the invisible threats often ignored or dismissed online. Using a step-by-step instruction format, the author, Jon Erikson, aims to teach everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. 
 
Link to buy The Art of Invisibility: The World’s Most Famous Hacker Teachers you How To Be Safe in the Age of Big Brother and Big Data
 
5. Ghost in the wires: My Adventures as the World’s Most Wanted Hacker by Kevin Mitnick
 
Kevin Mitnick can proudly say he’s written several well-respected books surrounding cyber security, however not all with reviews quite as positive as this one. A memoir of his time as an IT worker dealing with the FBI, the book primarily focuses on coding, and is as much an educational read as it is a thriller. Something that can’t be said for the majority of IT related reading material.
 
 Link to buy Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
 
You Might Also Read: 
 
The Cyberthreat Handbook:
 
 
 
« Australia's Cyber Security Plan Includes Domestic Surveillance
Google Bans Ads Linking To Hacked Political Content »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

Cofrac

Cofrac

Cofrac is the national accreditation body for France. The directory of members provides details of organisations offering certification services for ISO 27001.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

Safe Decision

Safe Decision

Safe Decision is an information technology company offering Cyber Security, Network, and Infrastructure Services and Solutions.

Highen Fintech

Highen Fintech

Highen is a blockchain software development company with offices in the United States and development centers in India.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

NoviFlow

NoviFlow

NoviFlow is a leading provider of terabit networking software solutions for Communication Service Providers (CSPs).

MadWolf Technologies

MadWolf Technologies

MadWolf’s mission is to deliver enterprise-quality managed services and focused applications to organizations operating in the non-profit, association and international development sectors.

Chorology

Chorology

Chorology is a leading provider of intelligently automated, data compliance and posture enforcement solutions.

TisOva

TisOva

TisOva is an innovative cybersecurity startup dedicated to addressing the growing issue of online scams targeting students.