• Tuesday, June 25, 2024

Frontlist | Top 5 Hacking and Cyber Security Books of 2020

Frontlist | Top 5 Hacking and Cyber Security Books of 2020
on Jan 21, 2021
Frontlist | Top 5 Hacking and Cyber Security Books of 2020
Continuous learning is a top priority for me.  It’s critical to stay updated on the latest cyber security methods, technologies, strategies, and developments. 2020 brought the opportunity for us to indulge in some additional reading and learn new skills from incredible industry experts. From a young age, I struggled reading the likes of Shakespeare and was more interested in the documentation for the cassette player, fridge, or computer. Though this would change later in life, it did set me up for my great interest in hacking, and ultimately in security. Today, there are so many ways to consume knowledge; you can listen to a podcast, read an eBook on your kindle, listen to the author on an audiobook, or get back to the good old physical book. While I do miss the in-person knowledge transfer gained during events and hope that we soon return to this method of educating ourselves, books were my go-to solution in 2020. I am your typical scribbler or post-it note guy. If you were to see my bookshelves you’d notice many little notes sticking out of the top of my books for quick references when I need them. I then use OneNote for my quick search, personal lessons, or if labs are part of the reading this includes my corrections and quick copy/paste. There are so many excellent books available—I get through at least one every week. Here are my top picks for cyber security and hacker books from 2020 to help you get going.
  1. Red Team Development and Operations: A Practical Guide
If you’re looking to get into pentesting or red teaming, this book is a brilliant read and clearly provides a great distinction and defined roles between vulnerability assessments, pentesting, and red teams. It’s a must-read for security managers or leaders, or for business managers looking for a security assessment, as it helps identify the false sense of security companies experience when they follow checkbox security approaches, such as some compliance requirements. The book includes examples and clear takeaways. From the awesome Joe Vest and James Tubberville
  1. Operator Handbook: Red Team + OSINT + Blue Team Reference
This is another must-have book, or actually a reference manual to be honest, for your collection—this time from the amazing Joshua Picolet aka Netmux. You may be familiar with his previous books on Password Cracking, like Hash Crack, which emphasizes the importance of strong password best practices and explains why default passwords are an open door. This latest operator handbook provides some great tips and command references for different security teams whether you’re a Red Team member, OSINT, or Blue Team. I’ve used this book many times when one of my techniques was not working; it provided me alternative methods. If you’re interested in getting into pentesting or cyber security or are already a security professional, this book is one to keep nearby.
  1. Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career
Here’s a book for everyone. Whether you’re starting your career in cyber security, a seasoned professional, or even in another business, you’ll get value from this book. The extremely talented Dr. Jessica Barker has literally brought cyber security back to the forefront and describes how it must and should help humans be successful and stay safe. Jess brings so much experience to the subject; she shares real-life examples and comparisons that take us a step back from the sometimes-technical trenches we get stuck in.
  1. The Ghidra Book: The Definitive Guide
Not for reading to your kids as a bedtime story or for the fiction section of your shelf. However, if you’re going down the career path of malware analysis or reverse engineering then this is the must-have book for you. Chris Eagle (author of the IDA Pro Book) and Kara Nance deliver a thoroughly detailed book that’s not a software guide but an actual how-to guide on using Ghidra for reverse engineering using well defined and helpful processes and techniques. The Ghidra Definitive Guide incorporates more than a decade of research, and for reverse engineers or malware analysis, this book should be a top priority. It includes great examples to help enhance your skills and knowledge.
  1. Hackable: How to Do Application Security Right
Well, the only way to end the top 5 of top cyber security and hacking books from 2020 is with Hackable, written by a good friend and industry peer Ted Harrington. If you’re responsible for creating applications for your business, then this is your book. It takes us into the mind of an attacker and demonstrates how they think. Learn different methodologies and which is best suited for your business. Identify vulnerabilities early and build security into your development lifecycle rather than a plug at the end. Hackable is a book on how to do application security the right way.   Written by:  Joseph Carson  

Post a comment

Your email address will not be published. Required fields are marked *


    Sorry! No comment found for this post.