Skip to main content

Resources

This is a collection of very good (from my point of view) material to start or get better in different computer security areas.

I did this because although Internet is an amazing thing where you can find tons of material, we have to admit that sometimes it can be very difficult to tell apart good resources from bad ones.

Most of the material is listed in order of proficiency (or difficulty) in a specific subject, so the first is generally the recommended starting point.

Prerequisites

  • Basic Knowledge of *NIX Systems and Windows
  • Basic programming skills
  • Basic Knowledge about Computer Networks

Books

Theoritical Foundations

  • The Basics of Information Security 2nd Edition by Jason Andres
  • Information Security 2nd Edition by Mark Stamp
  • Computer Security 2nd Edition by Matt Bishop
  • Computer Security: Principles and Practice 4th Edition by William Stallings
  • Network Security Essentials: Applications and Standards 6th Edition by William Stallings

Web Application Security

  • The Web Application Hacker's Handbook 2nd Edition by Stuttard and Pinto
  • Mastering Modern Web Penetration Testing by Prakhad Prasar
  • OWASP Testing Guide
  • AppSec by Tanya Janca AppSec: Pushing Left like a boss

Network Security

  • Network Security Assessment 3rd Edition by Chris McNab
  • The Hacker Playbook 3rd Edition by Kim
  • Linux Firewalls by Michael Rash
  • The Cyber Plumber's Handbook by Brennon Thomas
  • Practical Packet Analysis 3rd Edition by Chris Sanders
  • Nmap Network Scanning by Gordon Fyodor Lyon
  • Rtfm: Red Team Field Manual by Ben Clark
  • Hacking Windows: Ataques a sistemas y redes Microsoft by Carlos Garcia et al. (Spanish)

Wireless Security

  • Wireless Communication Networks and Systems, Global Edition Beard & Stallings
  • Kali Linux Wireless Penetration Testing Beginner's Guide 3rd Edition by Buchanan and Ramachandran
  • Kali Linux Wireless Penetration Testing Essentials by Marco Alamanni
  • Wireless Network Security: 2nd Edition by Wolfgang Osterhage

Binary Exploitation

IoT Security

  • IoT Hackers Handbook by Aditya Gupta
  • The Car Hacker's Handbook: A Guide for the Penetration Tester by Craig Smith

Malware Analysis

  • Practical Malware Analysis
  • The Malware Analyst's Cookbook
  • Reversing: The Secrets of Reverse Engineering

Cryptography

  • Serious Cryptography Jean-Philippe Aumasson
  • Cryptography Engineering by Niels Ferguson

Cracking and Bruteforce

  • Hash Crack: Password Cracking Manual (v3)

OSINT

  • Open Source Intelligence Techniques by Michael Bazzell
  • Hiding from the Internet: Eliminating Personal Online Information by Michael Bazzell

Social Engineering

  • Social Engineering: The Art of Human Hacking by Christopher Hadnagy
  • The Social Engineer's Playbook: A Practical Guide to Pretexting by Talamantes
  • The Art of Intrusion by Kevin Mitnick and William L. Simon
  • The Art of Deception by Kevin Mitnick and William L. Simon

Other

  • Threat Modeling: Designing for Security
  • How to Measure Anything in Cybersecurity Risk by Hubbard et al.
  • Effective Cybersecurity: A Guide to Using Best Practices and Standard by William Stallings
  • Cybersecurity Blue Team Toolkit by Tanner

Good Programming Books

  • C for 21st Century
  • The Art of Assembly
  • Learning Perl, Intermediate Perl and Mastering Perl by Schwartz et Al.
  • Fluent Python

Classics

  • Operating Systems by Tanenbaum
  • Computer Networks by Tanenbaum
  • Advanced Programming in the UNIX environment by Richard Stevens

Videos

Reverse Engineering