Cybersecurity Guide

  • Bootcamps
  • Degrees
    • Associate in Cybersecurity
    • Bachelor’s in Cybersecurity
    • Master’s in Cybersecurity
    • Cybersecurity Analytics Degree
    • Computer science with cybersecurity emphasis
    • MBA in cybersecurity
    • phd in cybersecurity
    • Cybersecurity law degree
  • Online
    • Online Certificate in Cybersecurity
    • online bachelor’s in cybersecurity
    • online IT degree
    • online master’s in cybersecurity
    • Online master’s in information security
    • online phd in cybersecurity
  • CERTIFICATIONS
    • Certified Information Systems Auditor (CISA)
    • Certified Ethical Hacker (CEH)
    • Certified Information Security Systems Professional (CISSP)
    • Certified Information Security Manager (CISM)
    • Digital Forensics Certifications
    • Security+
    • CompTIA Advanced Security Practitioner (CASP+)
    • Certified Network Defender (CND)
    • OSCP
    • CRISC
    • Pen Testing
    • CTIA
    • Cryptography
    • Malware Analyst
  • CAREER GUIDES
    • Security Engineer
    • Chief Information Security Officer
    • Security Analyst
    • Computer Forensics
    • Security Consultant
    • Digital Forensics
    • Cryptographer
    • Security Administrator
    • Penetration Tester
    • Security Software Developer
    • Security Specialist
    • Security Code Auditor
    • Security Architect
    • Malware Analyst
    • Data Protection Officer
    • Cybercrime Investigator
    • Cryptanalyst
    • Security Incident Responder
    • Chief Privacy Officer
    • Risk Manager
    • Network Administrator
    • Business InfoSec Officer
    • Information Security Manager
  • States
    • Alabama
    • Alaska
    • Arizona
    • Arkansas
    • California
    • Colorado
    • Connecticut
    • Delaware
    • Florida
    • Georgia
    • Hawaii
    • Idaho
    • Illinois
    • Indiana
    • Iowa
    • Kansas
    • Kentucky
    • Louisiana
    • Maine
    • Maryland
    • Massachusetts
    • Michigan
    • Minnesota
    • Mississippi
    • Missouri
    • Montana
    • Nebraska
    • Nevada
    • New Hampshire
    • New Jersey
    • New Mexico
    • New York
    • North Carolina
    • North Dakota
    • Ohio
    • Oklahoma
    • Oregon
    • Pennsylvania
    • Rhode Island
    • South Carolina
    • South Dakota
    • Tennessee
    • Texas
    • Utah
    • Vermont
    • Virginia
    • Washington
    • Washington, DC
    • Wisconsin
    • West Virginia
    • Wyoming
  • Podcast
  • RESOURCE CENTER
    • Job Guide
    • Veteran’s Guide
    • Women’s Guide
    • Certification Guide
    • Internship Guide
    • Security Clearance Guide
    • Ethical Hacker Guide
    • Coding for Cybersecurity Guide
    • Mastering the basics: A comprehensive guide to cybersecurity 101 for the digital age
    • Student Guide to Internet Safety
    • Scholarship Guide
    • Cybersecurity Math Guide
    • Small Business Guide
    • COVID-19 Guide
    • Cybersecurity for K-12 students
    • Career Networking Guide
    • What is a Cyber Range?
    • Code Like a Hacker
    • Reacting to a Cyber Incident
    • Introduction to Cyber Defense
    • Cybersecurity Courses Online
    • Recommended Reading
    • Cybersecurity Jobs Report
    • Phishing Attacks
    • Cybersecurity Responsibility
    • How to Get Into Cybersecurity
    • Cyberwarfare
    • Cybersecurity Insurance
    • Job Interview Prep
    • Readiness Economy
  • Industries
    • Financial Sector
    • Insurance Sector
    • Healthcare Sector
    • Environmental Sector
    • Energy Sector
    • Government Sector
    • Transportation Sector
    • Food and Ag Sector

Highly recommended: A cybersecurity reading list

Written by Cybersecurity Guide Contributors – Last updated: November 10, 2023
In this guide
  • Books
  • Talks
  • Papers/Articles
  • Games
  • Blogs
  • Podcasts
  • Trainings
  • Resources

Whether you are just at the beginning of your cybersecurity career, or a seasoned pro — the field is so complex and moving so fast that there is always an opportunity to learn more.

We have talked to more than two dozen cybersecurity experts including professors, researchers, and heads of industry and gotten recommendations for the best resources to create your own, personalized cybersecurity library including books, articles, papers, podcasts, videos, and more. 

“I always tell my students that cybersecurity is an ever-changing field. They need to be aware of that and never stop learning. They must continually apply self-improvement principles.”

— Ryan Sporrer, cybersecurity and digital crime instructor at Western Iowa Tech

Related resources

  • An interview with Ryan Sporrer
  • An interview with Matt Bishop
  • An Interview with Prasad Calyam
  • An interview with Ken Dewey
  • An interview with James Banfield

Here are the cybersecurity reading recommendations from the experts

Resource  Author/Domain Recommendation
BOOKS
@War Shane Harris Ken Dewey
Computer and
Internet Security 
Wenliang Du Prasad Calyam
Computer Security:
Art and Science 
Matt Bishop Matt Bishop
Crypto Steven Levy Ken Dewey
Cult of the Dead Cow:
How the Original Hacking Supergroup Might Just
Save the World
Joseph Menn Ryan Sporrer
Cybercon: Protecting
Ourselves from
Big Tech & Bigger Lies
James L Norrie Tamara Schwartz
Cyber Risk Handbook Domenic Antonucci Stan Mierzwa
Cyber Smart Bart R McDonough Stan Mierzwa
Daemon (fiction) Daniel Suarez Tamara Schwartz
Dark Territory Fred Kaplan Drew Hamilton
Forensic Discovery Dan Farmer
and Wietse Venema
Drew Hamilton
Foundations of
Cryptography
Oded Goldreich Eugene Vasserman
Ghost in the Wires: My Adventures as
the World’s Most
Wanted Hacker
Kevin Mitnick Ryan Sporrer
Hackers Steven Levy Ken Dewey
Hacking Exposed (book series) various Ryan Sporrer
Hacking: The Art of Exploitation  Jon Erikson James Banfield
In the Plex Steven Levy Ken Dewey
Pentagon Brain Annie Jacobson Ken Dewey
Which Side of History  James Steyer Yan Solihin
Network Security Bible Eric Cole James Banfield
No Starch Press
cybersecurity book series
various Bill Mahoney
Rules for Radicals  Saul Alinsky Matt Bishop
Reveille for Radicals Saul Alinsky Matt Bishop
Schneier on Security Bruce Schneier Clifford Neuman
Security Engineering  Ross Anderson Eugene Vasserman
Social Engineering: The
Science of Human Hacking 
Christopher Hadnagy Hossein Sarrafzadeh
Spam Nation Brian Krebs Ken Dewey
Superintelligence Nick Bostrom Ken Dewey
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Kevin Mitnick Ryan Sporrer
The Art of War  Sun Tzu Matt Bishop
The Code Book  Simon Singh Yan Solihin/George Markowsky
The Countdown to Zero Day Kim Zetter Nate Evans
The Cuckoo’s Egg Cliff Stoll Ryan Sporrer
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats Richard A. Clarke
and Robert K Knake
Tamara Schwartz
The Hacker Playbook (series) Peter Kim Tobi West
The Power of Moments Chip Heath
and Dan Heath
Nate Evans
The Prince Machiavelli Matt Bishop
The Principles for
Cybersecurity Operations
Hinne Hettema Hossein Sarrafzadeh
The Wasp (fiction) Eric Frank Russell Matt Bishop
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws Dafydd Studdard and
Marcus Pinto
Ryan Sporrer
Tubes: A Journey to the
Center of the Internet
Andrew Blum Nate Evans
Unrestricted Warfare Qiao Lang and
Wang Xiangsui
Drew Hamilton
Zero Day (fiction) David Baldacci Tamara Schwartz
PAPERS/ARTICLES
Cyber Campaigns and
Strategic Outcomes
Journal of
Strategic Studies
Richard Harknett
How to Compete in Cyberspace Foreign Affairs Richard Harknett
National Cybersecurity Policy The White House Joe Scherrer
NIST Framework National Institute
of Standards and
Technology
Ulku Clark
Reflections on Trusting Trust Ken Thompson Nate Evans
Sony Pictures: Inside the Hack of the Century Fortune Joe Scherrer
The Protection of Information in Computer Systems Jerome H Saltzer
and Michael D Schroeder
Matt Bishop
The Real Story of Stuxnet IEEE Joe Scherrer
The Taxonomy of Privacy University of
Pennsylvania Law
Review, Daniel J Solove
Tobi West
The Untold Story
of NotPetya, the Most Devastating Cyberattack in History
Wired Joe Scherrer
Verizon Data Breach Investigations Report
(DBIR)
Verizon Prasad Calyman
GAMES 
wargames overthewire.org Prasad Calyam
BLOGS
Bruce Schneier schneier.com Yan Solihin/George Markowsky
Cyber Defense Magazine cyberdefense
magazine.com
Prasad Calyam
CyberWire thecyberwire.com Ulku Clark
Dark Reading  darkreading.com Ralph Russo
Krebs on Security krebsonsecurity.com Tobi West
Lawfare lawfareblog.com Richard Harknett
SANS Reading Room SANS Institute Tobi West
Shira Ovide (NYTimes) nytimes.com/by/
shira-ovide
Ralph Russo
TALKS
Everyday cybercrime – and what you can do about it TED Talk Prasad Calyam
Fighting viruses,
defending the net
TED Talk Prasad Calyam
PODCASTS
Darknet Diaries darknetdiaries.com Leslie Corbo
Security Now twit.tv/shows/
security-now
Leslie Corbo
SpyCast spymuseum.org/
multimedia/spycast/
Greg Gogolin
The Cyberwire
thecyberwire.com
/podcasts
Greg Gogolin
TRAININGS
CCSK All-In-One Exam
Guide by McGraw Hill
Stan Mierzwa
CISSP Official Study
Guide by SYBEX
Stan Mierzwa
Hack This Site James Banfield
Hacker Tracker Cyber
Security Workshop Camp
Prasad Calyam
Kali.org George Markowsky
National Cyber League Ulku Clark

More cybersecurity resources

If you are looking for more actionable cybersecurity information, be sure to check out our resource section which contains popular guides on topics such as:

  • Cybersecurity 101
  • Cybersecurity jobs
  • Cybersecurity certifications
  • Ethical hacker guide

Primary Sidebar

  • Online Programs
    • Bootcamps
    • Bachelor’s
    • Master’s
Sponsored Ad
cybersecurityguide.org is an advertising-supported site. Clicking in this box will show you programs related to your search from schools that compensate us. This compensation does not influence our school rankings, resource guides, or other information published on this site.
  • CERTIFICATIONS
    • Azure
    • CASP+
    • CCNA
    • CEH
    • CISA
    • CISM
    • CISSP
    • CRISC
    • Cryptography
    • CTIA
    • CND
    • Forensics
    • Malware Analyst
    • OSCP
    • Pen Testing
    • Security+
  • CAREERS
    • Security Engineer
    • Chief Information Security Officer
    • Security Analyst
    • Computer Forensics
    • Security Consultant
    • Digital Forensics
    • Cryptographer
    • Security Administrator
    • Penetration Tester
    • Security Software Developer
    • Security Specialist
    • Security Code Auditor
    • Security Architect
    • Malware Analyst
    • Data Protection Officer
    • Cybercrime Investigator
    • Cryptanalyst
    • Security Incident Responder
    • Chief Privacy Officer
    • Risk Manager
    • Network Administrator
    • Business InfoSec Officer
    • Information Security Manager
    • Cyber Operations Specialist
  • RESOURCE CENTER
    • Centers for Academic Excellence
    • Job Guide
    • Veteran’s Guide
    • Women’s Guide
    • Internship Guide
    • Security Clearance Guide
    • Ethical Hacker Guide
    • Coding for Cybersecurity Guide
    • Cybersecurity 101
    • Student Guide to Internet Safety
    • Scholarship Guide
    • Cybersecurity Math Guide
    • Small Business Guide
    • Cybersecurity for K-12 Students
    • Career Networking Guide
    • What is a Cyber Range?
    • Code Like a Hacker
    • Reacting to a Cyber Incident
    • Introduction to Cyber Defense
    • Cybersecurity Courses Online
    • Recommended Reading
    • Cybersecurity Jobs Report
    • Phishing Attacks
    • Cybersecurity Responsibility
    • How to Get Into Cybersecurity
    • Cyberwarfare
    • Cybersecurity Insurance
    • Job Interview Prep
    • Readiness Economy
    • Is Cyber a Good Career?
    • What is CyberCorps?
    • DEI in Cyber
    • NIST and Small Business
    • Holiday Hacks
  • INDUSTRIES
    • Financial Sector
    • Insurance Sector
    • Healthcare Sector
    • Environmental Sector
    • Energy Sector
    • Government Sector
    • Transportation Sector
    • Food and Agriculture Sector
Cybersecurity Guide
  • Home
  • Campus Programs
  • About Us
  • Popular Careers
  • Online Programs
  • Terms of Use
  • Resources
  • Programs By State
  • Privacy Policy

Copyright © 2024 · Cybersecurity Guide · All Rights Reserved