Resources
This is a collection of very good (from my point of view) material to start or get better in different computer security areas.
I did this because although Internet is an amazing thing where you can find tons of material, we have to admit that sometimes it can be very difficult to tell apart good resources from bad ones.
Most of the material is listed in order of proficiency (or difficulty) in a specific subject, so the first is generally the recommended starting point.
Prerequisites
- Basic knowledge of *NIX and Windows Systems
- Basic programming skills
- Basic knowledge about Computer Networks
Books
Theoritical Foundations
- Security in Computing by Charles Pfleeger et al.
- Foundations of Information Security by Jason Andres
- The Basics of Information Security 2nd Edition by Jason Andress
- Information Security 2nd Edition by Mark Stamp
- Computer Security 2nd Edition by Matt Bishop
- Computer Security: Principles and Practice 4th Edition by William Stallings
- Network Security Essentials: Applications and Standards 6th Edition by William Stallings
Web Application Security
- The Web Application Hacker's Handbook 2nd Edition by Stuttard and Pinto
- Mastering Modern Web Penetration Testing by Prakhad Prasar
- OWASP Testing Guide
- AppSec by Tanya Janca AppSec: Pushing Left like a boss
Network Security
- Network Security Assessment 3rd Edition by Chris McNab
- The Hacker Playbook 3rd Edition by Kim
- Linux Firewalls by Michael Rash
- The Cyber Plumber's Handbook by Brennon Thomas
- Practical Packet Analysis 3rd Edition by Chris Sanders
- Nmap Network Scanning by Gordon Fyodor Lyon
- Rtfm: Red Team Field Manual by Ben Clark
- Hacking Windows: Ataques a sistemas y redes Microsoft by Carlos Garcia et al. (Spanish)
Wireless Security
- Wireless Communication Networks and Systems, Global Edition Beard & Stallings
- Kali Linux Wireless Penetration Testing Beginner's Guide 3rd Edition by Buchanan and Ramachandran
- Kali Linux Wireless Penetration Testing Essentials by Marco Alamanni
- Wireless Network Security: 2nd Edition by Wolfgang Osterhage
Binary Exploitation
- The Art of Hacking 2nd Edition by Ericksson
- Gray Hat Hacking 5th Edition by Regalado et al.
- The Shellcoder's Handbook 2nd Edition by Chris Anley, John Heasman et al.
- Practical Binary Analysis by Dennis Andriesse
- Open Security Exploit 1
- Open Security Exploit 2
- SecurityTube Research Exploit
- SecurityTube Buffer Overflow
- Exploit Dev Class
IoT Security
- IoT Hackers Handbook by Aditya Gupta
- The Car Hacker's Handbook: A Guide for the Penetration Tester by Craig Smith
Malware Analysis
- Practical Malware Analysis
- The Malware Analyst's Cookbook
- Reversing: The Secrets of Reverse Engineering
Cryptography
- Serious Cryptography Jean-Philippe Aumasson
- Cryptography Engineering by Niels Ferguson
Cracking and Bruteforce
- Hash Crack: Password Cracking Manual (v3)
OSINT
- Open Source Intelligence Techniques by Michael Bazzell
- Hiding from the Internet: Eliminating Personal Online Information by Michael Bazzell
Social Engineering
- Social Engineering: The Art of Human Hacking by Christopher Hadnagy
- The Social Engineer's Playbook: A Practical Guide to Pretexting by Talamantes
- The Art of Intrusion by Kevin Mitnick and William L. Simon
- The Art of Deception by Kevin Mitnick and William L. Simon
Other
- Threat Modeling: Designing for Security
- How to Measure Anything in Cybersecurity Risk by Hubbard et al.
- Effective Cybersecurity: A Guide to Using Best Practices and Standard by William Stallings
- Cybersecurity Blue Team Toolkit by Tanner
Good Programming Books
- C for 21st Century
- The Art of Assembly
- Learning Perl, Intermediate Perl and Mastering Perl by Schwartz et Al.
- Fluent Python
Classics
- Structure and Interpretation of Computer Programs (the "legendary" wizard book)
- Operating Systems by Tanenbaum
- Computer Networks by Tanenbaum
- Advanced Programming in the UNIX environment by Richard Stevens