Home
Book Resources
Humberger Toggle Menu
Book Resources
Here is the list of all URLs we reference in the book.
Buy Now
Chapter 1: Introduction
Cybersecurity definition by Gartner
US Bureau of Labor Statistics for information security analysts
Chapter 2: Building Breadth
Operating Systems Books
Operating System Concepts (Abraham Silberschatz):
Modern Operating Systems (Andrew Tanenbaum)
Computer Networks Resources
Computer Networks 5th Edition
Networking Hardware
Phase 1: Application Fundamentals Exercise
Process Hacker
Process Monitor
Activity Monitor
Wireshark
ps commands
chrome dev tools
Phase 2: Information Security Fundamentals: Security Basics
Cyber kill chain
A “Kill Chain” Analysis of the 2013 Target Data Breach
OWASP site
Security Basics books
The InfoSec Handbook: An Introduction to Information Security
Chapter 3: Building Depth
Application Security Engineer
OWASP Threat modeling process
STRIDE
Threat modeling manifesto
Project webgoat
DVWA
Portswigger web security academy
Web Application Exploits and Defenses codelab
OWASP Juice Shop (vulnerable web application for learning and testing)
Detection Engineer
Honeypots
Detection resources
IDS/IPS module on hackthebox
Install splunk on linux tutorial
Bots Data Set
Digital Forensics and Incident Response
Chain of Custody definition by NIST
Chain of Custody definition by National Institute of Health
Computer Security Incident Handling Guide by NIST
SANS Incident Handling framework
Incident Management Metrics
DFIR Books
File System Forensics
Art of memory forensics
Network Forensics
Blue Team Handbook
Incident Response Exercise
FTK imager tutorial
Lime tutorial
OSXPmem tutorial
Volatility framework tutorial
Volatility command reference
VMWare installation tutorial on Ubuntu
FTK imager tutorial
dd command tutorial
Carbon copy cloner tutorial
The Sleuthkit (TSK) tutorial
The Sleuthkit (TSK) command reference
GRR Rapid Response tutorial
GRR flows tutorial
Log2timeline tutorial
Chapter 4: Skills and Experiences
Certifications
Certifications by level
CompTIA roadmap
Certifications podcast
Certification Roadmap
Conferences
BSides
OWASP local chapters
Infosec conference website
Capture The Flag
Picoctf
CTFtime
Internships
Handshake platform
Chapter 5: Introduction to Security Engineering Interviews
Before the Interview
Interview study notes
Informational Interview
Finding a Role
Job Boards
Google Jobs
Linkedin
Indeed
Seek (ANZ)
Jobstreet
Naukri.com
Shine.com
Bayt
ZipRecruiter
Dubizzle
Gulftalent
Reed
Hired
CV Library
Adzuna
Glassdoor
Dice
Monster
Blind
Coding for SEs
Maslow hierarchy of needs
Soft Skills
Equifax data breach settlement
Apache struts vulnerability
Coding Fundamentals
There are several online resources to develop coding skills. Here are some of them.
Interview Bit Programming Course
Geeks for geeks
Educative
Chapter 6: Additional Resources
Levels.fyi
Glassdoor
Payscale
Miscellaneous Resources
Blogs/Learning Platforms:
ThreatPost
Dark Reading
tl;dr sec
Tryhackme
Security focused newsletters
TLDR Sec
CloudSec List
Ars Technica
This week in security
Podcasts
Darknet diaries
Risky Business
Cloud Security podcast by Google
CyberWire Daily
Application Security Learning Resources
Vulnerability tutorials
OWASP Top 10 Web Vulnerabilities
Books
The Complete Guide to Defense in Depth
Scroll to Top