Essential Books For Learning About Cyber Security

The cyber security industry and all of the threats and dangers involved within it, is enough to write a best-selling Sci-Fi/ horror novel, though unfortunately, the reality is these things are all too real, and the threats exist outside of the pages of the book.
 
Acora have listed some essential reading for those who want to be clued up on the world of cyber security, and the ways you can ensure you are prepared for any mishaps, but also to ensure you have the technical skills to find the areas of vulnerability and avoid disaster in the first place.
 
1. Advanced penetration testing by Wil Allsopp
 
Performing hacking and penetration tests for Fortune 100 companies worldwide teaches you a thing or two, and so Will Allsopp created Advanced penetration Testing: Hacking The World’s Most Secure Networks to provide guidance and in depth information on all you need to know about techniques for targeting and compromising high security connections that aren't taught in any certification or covered by most of the common defense scanners. From discovering and creating attack vectors, employing social engineering tactics to create an initial compromise and using advanced methods for escalating privilege, this book has everything needed to really get to grips with the nitty gritty of penetration testing.
 
Link to buy ‘Advanced penetration testing” on Amazon here.
 
2. The Hacker Playbook 2: Practical Guide to Penetration Testing by Peter Kim
 
Professional athletes don’t turn up unprepared and without a plan, and neither should IT professionals or security researchers. This straight forward guide provides a more practical approach to various aspects of penetration testing including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. Written by a highly skilled security professional and CEO of Secure Planet Ltd. If you’re looking to further improve your skills, this hands-on guide will get you there.
 
Link to buy ‘The Hacker Playbook 2: Practical Guide to Penetration Testing.
 
 
3. Hacking: The Art of Exploitation by Jon Erickson
 
This book dives into the world of problem solving and exploitation and provides a much more holistic view of programming, network communications and current hacking techniques. This book also comes with a live CD to allow you to create a safe linux environment to delve into the nitty gritty of programming and debugging code, without compromising the security of your own operating system. 
 
Link to buy Hacking: The Art of Exploitation
 
4. The Art of Invisibility: The World’s Most Famous Hacker Teaches You How To Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick
 
Many people like to describe themselves as hackers but few have the ability and strong technical foundation needed to really push the boundaries. A book to be read by even those not looking to improve technical knowledge, but more so by those interested in the modern-day world, and the invisible threats often ignored or dismissed online. Using a step-by-step instruction format, the author, Jon Erikson, aims to teach everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. 
 
Link to buy The Art of Invisibility: The World’s Most Famous Hacker Teachers you How To Be Safe in the Age of Big Brother and Big Data
 
5. Ghost in the wires: My Adventures as the World’s Most Wanted Hacker by Kevin Mitnick
 
Kevin Mitnick can proudly say he’s written several well-respected books surrounding cyber security, however not all with reviews quite as positive as this one. A memoir of his time as an IT worker dealing with the FBI, the book primarily focuses on coding, and is as much an educational read as it is a thriller. Something that can’t be said for the majority of IT related reading material.
 
 Link to buy Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
 
You Might Also Read: 
 
The Cyberthreat Handbook:
 
 
 
« Australia's Cyber Security Plan Includes Domestic Surveillance
Google Bans Ads Linking To Hacked Political Content »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

SecuLution

SecuLution

SecuLution is an Antivirus product using Application Whitelisting which offers much more protection than Virus Scanners ever can.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

Department of Justice - Office of Cybercrime (DOJ-OOC)

Department of Justice - Office of Cybercrime (DOJ-OOC)

The Office of Cybercrime within the Philippines Department of Justice is the Central Authority in all matters relating to international mutual assistance and extradition for cybercrime.

Oceania Cyber Security Centre (OCSC)

Oceania Cyber Security Centre (OCSC)

OCSC engages with government and industry to conduct research, develop training opportunities and build capacity for responding to current and emerging cyber security issues.

WiSecure Technologies

WiSecure Technologies

WiSecure Technologies aims to develop cryptographic products meeting requirements in the new economic era.

DataViper

DataViper

DataViper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Access Venture Partners

Access Venture Partners

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. Areas we give special focus to include cybersecurity.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.

Cyber Castle

Cyber Castle

Linux Demands Sophisticated, Purpose-Built Security. Cyber Castle is the solution. A safe, deployable platform down to the edge device for monitoring Linux security anywhere across the globe.

Krash Consulting

Krash Consulting

Krash Consulting is a premier provider of Cyber Security solutions, offering a range of services to safeguard businesses against cyber-attacks, minimize fraud, and protect brand reputation globally.