Books and Courses
This page collects high-quality, practical books, online courses, and learning platforms I recommend for building real-world cybersecurity skills. The list is organized by level and role, with short notes on why each resource helps and how to use it inside your lab or study plan.
Use these resources to learn defensively and legally. Donβt practice offensive techniques on targets you donβt own or arenβt authorized to test.
How to pick resourcesβ
Use this simple formula to pick study time and intensity:
Example: a 12-week study block at 8 hours/week gives hours β enough to complete 1β2 intermediate courses plus hands-on labs.
Beginner β foundations (skills, 1β3 months)β
Booksβ
- The Web Application Hacker's Handbook β excellent for practical web security fundamentals and payload mindset.
- Hacking: The Art of Exploitation β core systems and exploitation concepts with hands-on C examples (good for thinking like an attacker).
- Practical Packet Analysis β short book to learn packet capture basics (Wireshark/tcpdump).
Courses & Platformsβ
- TryHackMe (Beginner Paths) β guided, hands-on rooms for absolute beginners (networking, web, Linux basics).
- Coursera / edX β βIntroduction to Cybersecurityβ or vendor-backed beginner certificates (IBM, Google, etc.).
- Udemy β beginner-friendly courses like βComplete Cyber Security Courseβ (look for high-rated instructors such as Nathan House).
How to use themβ
- Read one book while completing 2β3 TryHackMe beginner modules.
- Build a lab (Kali + vulnerable VM) and practice simple tasks: scanning, packet capture, and a basic SQLi lab.
Intermediate β tooling & practice (3β6 months)β
Booksβ
- Metasploit: The Penetration Testerβs Guide β practical exploitation workflows using Metasploit.
- Practical Malware Analysis β great for getting started with dynamic/static malware analysis (laboratory-focused).
- The Practice of Network Security Monitoring β for blue team skills: detection and monitoring.
Courses & Platformsβ
- TryHackMe (Intermediate / Offensive Paths) β CTF-style labs and structured paths for pentesting basics.
- Hack The Box (HTB) β hands-on vulnerable machines, great for practicing enumeration & exploitation.
- Offensive Security (PWK / OSCP) β if you want a rigorous, hands-on pentesting course (lab-heavy).
- Pluralsight / LinkedIn Learning β targeted courses for specific OS or stack skills (Windows internals, Linux hardening).
How to use themβ
- Pair a book chapter with a targeted lab (e.g., read Metasploit chapter β exploit a Metasploitable VM).
- Aim to solve 1 HTB machine per week and keep a writeup journal.
Advanced & Specialization (6+ months)β
Booksβ
- Applied Cryptography β deep dive into cryptographic primitives and design (theory + practice).
- Rootkits & Bootkits (or vendor advanced titles) β for deep OS internals & persistence techniques.
- Vendor and SANS books on advanced DFIR, forensics, and exploit dev.
Courses & Platformsβ
- Offensive Security β OSCP β OSCE (advanced) β exam and lab-focused progression for exploit development and deep pentesting.
- SANS Institute β high-quality, high-cost courses on DFIR, ICS/SCADA, advanced incident response.
- eLearnSecurity / Pentester Academy β advanced offensive/defensive specializations.
- Cloud security courses (AWS/Azure/GCP security tracks) β for cloud-native attack/defense.
How to use themβ
- Combine advanced reading with long, timed lab exercises (e.g., multi-week exploit chains, red-team scenarios).
- Contribute to writeups, open-source tooling, or research to deepen mastery.
Practical, role-focused learning pathsβ
- Pentester: Foundations β Nmap, Burp, Metasploit β HTB/OSCP β Advanced exploit dev.
- Blue team / SOC analyst: Foundations β Splunk/ELK, Security Onion β Incident response & threat hunting.
- Forensics / Malware Analyst: Foundations β Autopsy & Volatility β dynamic malware analysis / sandboxing.
Recommended hands-on platforms & labsβ
- TryHackMe β excellent guided beginner β intermediate paths.
- Hack The Box β real-world machine practice, scalable difficulty.
- VulnHub / Metasploitable β downloadable vulnerable VMs for offline labs.
- RangeForce / Immersive Labs β scenario-based SOC training (team/enterprise focus).
- Cuckoo Sandbox / Any.run β for safe malware execution and observation.
Courses & Certificates β which to chooseβ
- Entry-level / career-starters: Google Cybersecurity Certificate, IBM Cybersecurity Analyst (Coursera), CompTIA Security+.
- Hands-on offensive: Offensive Security PWK β OSCP (laboratory and exam).
- Hands-on defensive: Splunk Fundamentals + Splunk certifications; Elastic/Kibana training; Security Onion courses.
- Management / governance: CISSP (broad), CISM (management-focused).
Certifications support hiring and credibility β but practical labs and documented projects (HTB writeups, GitHub repos, blog posts) are often more convincing in job interviews.
Study plan β 12-week sample (balanced)β
Weeks 1β4 (Foundations)β
- Read a foundational book (e.g., Web App Hackerβs Handbook chapter excerpts).
- Complete TryHackMe beginner path (networking + web basics).
- 6β8 hours/week hands-on.
Weeks 5β8 (Tools & Practice)β
- Finish a focused course (Burp / Nmap + Web labs).
- Solve 6 HTB/THM machines (one per 3β4 days).
- Start a lab notebook / writeups.
Weeks 9β12 (Project & Report)β
- Pick a target VM β run a full pentest (recon β exploit β post-exploit) in lab.
- Produce a short report and remediation recommendations.
- Prepare for a certification exam if desired.
Free vs Paid β what to invest inβ
- Free: TryHackMe (many free rooms), VulnHub, OWASP resources, YouTube instructors (John Hammond, LiveOverflow), GitHub repos, OWASP Juice Shop.
- Paid & high-value: OSCP (lab depth), SANS (enterprise-grade), Pluralsight/OffSec courses for structured progression, books from reputable publishers (No Starch, OβReilly).
- Tip: Start with free resources; invest in one paid, lab-heavy course (OSCP or equivalent) when youβre ready to commit time.
Continuous learning β podcasts, newsletters, and blogsβ
- Podcasts: Darknet Diaries, Risky Business, Security Weekly β good for threat context and stories.
- Newsletters / blogs: SANS Internet Storm Center, Krebs on Security, Cloud provider security blogs (AWS, Microsoft) for cloud-focused learners.
- Twitter / X and Mastodon: follow respected practitioners for short tips and links to research.
How to keep momentum (practical tips)β
- Build a weekly habit (2β3 focused sessions of 60β120 minutes).
- Maintain a lab notebook with timestamps, commands, and lessons learned.
- Publish 1 writeup every month (HTB box, lab exercise, or vulnerability replication).
- Join local meetups and online communities β accountability speeds learning.
Quick annotated reading list (one-line why)β
- The Web Application Hackerβs Handbook β web app attack and defense best practices.
- Hacking: The Art of Exploitation β systems fundamentals and exploit mindset.
- Practical Malware Analysis β malware triage & sandboxing techniques.
- Metasploit: The Penetration Testerβs Guide β exploitable modules & workflow.
- The Practice of Network Security Monitoring β building the blue team muscle.