THE CU
  • Home
  • Blogs
  • Offense
    • Pen Tester Training Program
    • Offensive Cheat Sheets >
      • Bash Commands
      • Network Enumeration
      • Web Enumeration
      • Windows Post Ex
      • Metasploit
      • Shells
      • PowerShell
    • Offensive Links
  • Defense
    • Junior SOC Analyst Roadmap
    • Intermediate SOC Analyst Training Program
    • Defense Links
    • RDP Analysis
  • Land A Job
    • Entry-Level InfoSec Jobs
    • Improve Resume
    • Find a Job
    • Interview Prep
    • Grow as a Practitioner
    • Get Experience
  • FAQS
  • Other
    • Certifications
    • Finance, Travel, and Mental HealthBooks
    • Finance Resources
    • Infosec Conferences
    • CTFs
    • Cyber Ranges
    • Twitter People to Follow
    • Podcasts
    • Books
    • Twitch Streamers

Malware Analysis

Book
Description
The Art of Computer Virus Research and Defense
​by Peter Szor​
An encyclopedia and historical look at malware. Szor discusses classifications, behaviors, and analysis of malware. Ultimately providing you insight into how experts at AV companies look at computer viruses. I enjoyed the read and trip through time. It is amazing that many of the techniques are still used today.
​
If you are interested in the subject of malware analysis, add this to your reading list.

Self-Improvement

Book
Description
essentialism
by Greg McKeown
If you find that you just don't have enough time to accomplish your goals or feel overwhelmed by your day, this book will give you perspective. McKeown discusses how we spend so much time on pointless activities, and neglect the things that are truly important.

​This is one of my favorite books of this year.

Other Blog's Recommended Reading

Site
Description
DFIR.org
Book recommendations across pretty much every subject related to cyber security.

My "To Read" List

Book
Author
Red Team Field Manual
Ben Clark
Coding For Penetration Testers
Jason Andress and Ryan Linn
The Browser Hacker's Handbook
Wade Alcom, Christian Frichot, et al.
Metasploit: The Penetration Tester's Guide
Dave Kennedy
The Shellcoder's Handbook
Chris Anley, John Heasman, et al.
Nmap Network Scanning
Gordon Fyodor Lyon
Red Team: How to Succeed By Thinking Like The Enemy
Micha Zenko, Christopher Lane, et al.
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
Unix Shell Programming
Stephen G. Kochan and Patrick Wood
Classic Shell Scripting
Arnold Robbins and Nelson H.F. Beebe
Unauthorized Access: Physical Penetration Testing
Wil Allsopp and Kevin Mitnick
Home      Blogs    Disclaimers    Copyright Notice   Cookie Policy ​
  • Home
  • Blogs
  • Offense
    • Pen Tester Training Program
    • Offensive Cheat Sheets >
      • Bash Commands
      • Network Enumeration
      • Web Enumeration
      • Windows Post Ex
      • Metasploit
      • Shells
      • PowerShell
    • Offensive Links
  • Defense
    • Junior SOC Analyst Roadmap
    • Intermediate SOC Analyst Training Program
    • Defense Links
    • RDP Analysis
  • Land A Job
    • Entry-Level InfoSec Jobs
    • Improve Resume
    • Find a Job
    • Interview Prep
    • Grow as a Practitioner
    • Get Experience
  • FAQS
  • Other
    • Certifications
    • Finance, Travel, and Mental HealthBooks
    • Finance Resources
    • Infosec Conferences
    • CTFs
    • Cyber Ranges
    • Twitter People to Follow
    • Podcasts
    • Books
    • Twitch Streamers