Essential Books For Learning About Cyber Security

The cyber security industry and all of the threats and dangers involved within it, is enough to write a best-selling Sci-Fi/ horror novel, though unfortunately, the reality is these things are all too real, and the threats exist outside of the pages of the book.
 
Acora have listed some essential reading for those who want to be clued up on the world of cyber security, and the ways you can ensure you are prepared for any mishaps, but also to ensure you have the technical skills to find the areas of vulnerability and avoid disaster in the first place.
 
1. Advanced penetration testing by Wil Allsopp
 
Performing hacking and penetration tests for Fortune 100 companies worldwide teaches you a thing or two, and so Will Allsopp created Advanced penetration Testing: Hacking The World’s Most Secure Networks to provide guidance and in depth information on all you need to know about techniques for targeting and compromising high security connections that aren't taught in any certification or covered by most of the common defense scanners. From discovering and creating attack vectors, employing social engineering tactics to create an initial compromise and using advanced methods for escalating privilege, this book has everything needed to really get to grips with the nitty gritty of penetration testing.
 
Link to buy ‘Advanced penetration testing” on Amazon here.
 
2. The Hacker Playbook 2: Practical Guide to Penetration Testing by Peter Kim
 
Professional athletes don’t turn up unprepared and without a plan, and neither should IT professionals or security researchers. This straight forward guide provides a more practical approach to various aspects of penetration testing including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. Written by a highly skilled security professional and CEO of Secure Planet Ltd. If you’re looking to further improve your skills, this hands-on guide will get you there.
 
Link to buy ‘The Hacker Playbook 2: Practical Guide to Penetration Testing.
 
 
3. Hacking: The Art of Exploitation by Jon Erickson
 
This book dives into the world of problem solving and exploitation and provides a much more holistic view of programming, network communications and current hacking techniques. This book also comes with a live CD to allow you to create a safe linux environment to delve into the nitty gritty of programming and debugging code, without compromising the security of your own operating system. 
 
Link to buy Hacking: The Art of Exploitation
 
4. The Art of Invisibility: The World’s Most Famous Hacker Teaches You How To Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick
 
Many people like to describe themselves as hackers but few have the ability and strong technical foundation needed to really push the boundaries. A book to be read by even those not looking to improve technical knowledge, but more so by those interested in the modern-day world, and the invisible threats often ignored or dismissed online. Using a step-by-step instruction format, the author, Jon Erikson, aims to teach everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. 
 
Link to buy The Art of Invisibility: The World’s Most Famous Hacker Teachers you How To Be Safe in the Age of Big Brother and Big Data
 
5. Ghost in the wires: My Adventures as the World’s Most Wanted Hacker by Kevin Mitnick
 
Kevin Mitnick can proudly say he’s written several well-respected books surrounding cyber security, however not all with reviews quite as positive as this one. A memoir of his time as an IT worker dealing with the FBI, the book primarily focuses on coding, and is as much an educational read as it is a thriller. Something that can’t be said for the majority of IT related reading material.
 
 Link to buy Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
 
You Might Also Read: 
 
The Cyberthreat Handbook:
 
 
 
« Australia's Cyber Security Plan Includes Domestic Surveillance
Google Bans Ads Linking To Hacked Political Content »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Exodus Intelligence

Exodus Intelligence

Exodus Intelligence are an industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

CynergisTek

CynergisTek

CynergisTek is a top-ranked cybersecurity and information management consulting firm dedicated to serving the healthcare industry.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

IberLayer

IberLayer

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks email threats.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

CYRail

CYRail

CYRail project will analyse threats targeting Railway infrastructures and develop innovative attack detection and alerting techniques.

BitNinja

BitNinja

BitNinja provides full-stack server security in one easy-to-use protection suite. Enjoy real-time protection, automatic false positive handling and threat analysis for more in-depth insights.

Global Cybersecurity Association (GCA)

Global Cybersecurity Association (GCA)

GCA’s Symposium and conferences featuring global thought leaders and CISOs provide a global best practice perspective on cybersecurity.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.