InfoSec Reading List

I often get asked which books are worth reading for an aspiring InfoSec pro. While there are many great books out there, each serving a unique purpose, here are my general recommendations.

The Basics:

  • Wireshark 101: Essential Skills for Network Analysis – Second Edition: Wireshark Solution Series
  • Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World Network Problems
  • The Art of Deception: Controlling the Human Element of Security
  • Defensive Security Handbook: Best Practices for Securing Infrastructure
  • Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
  • T CP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)
  • Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
  • A Bug Hunter’s Diary
  • Ghost in the Wires
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Offensive Security Books:

  • Rtfm: Red Team Field Manual
  • The Hacker Playbook 3: Practical Guide To Penetration Testing
  • Penetration Testing: A Hands-On Introduction to Hacking
  • The Hacker Playbook: Practical Guide To Penetration Testing
  • Hash Crack: Password Cracking Manual (v3)
  • The Hacker Playbook 2: Practical Guide To Penetration Testing

Defensive Security Books:

  • Blue Team Field Manual (BTFM)
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
  • Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter
  • Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. Second Edition.
  • Network Forensics Tracking Hackers Through Cyberspace
  • The Tao of Network Security Monitoring: Beyond Intrusion Detection