SUPLEMENTAL MATERIAL

This page will be updated regularly to include new suplemental material.

TEXTBOOKS

Brooks, C.J., Grow, C., Craig, P.A., Short, D. 2018. Cybersecurity Essentials.

William Stallings and Lawrie Brown. 2014. Computer Security: Principles and Practice (3rd. ed.). Prentice Hall Press, USA.

UPON REQUEST MATERIAL

COMPTIA Security + Certification Guide

Cybersecurity - Attack and Defense Strategies

Digital Forensics and Incident Response

Hands-On Cybersecurity for Architects

Hands-On Cybersecurity with Blockchain

Hands-On Penetration Testing on Windows

Indsutrial Cybersecurity

Kali Linux - An Ethical Hacker's Cookbook

Learning Malware Analysis

Mastering Kali Linux for Advanced Penetration Testing

Mastering pfSense

Metasploit for Beginners

Metasploit for Penetration Testing Cookbook

Network Analysis Using Wireshark 2 Cookbook

Nmap - Network Expoloration and Security Auditing

Practical Cyber Intelligence

Practical Mobile Forensics

Web Penetration Testing with Kali Linux

Advanced Penetration Testing - Hacking the World's Most Secure Networks

Applied Cryptography - Protocols, Algorithms and Source Code in C, 20th Anniversary Edition

Cryptography Engineering - Design Principles and Practical Applications

Investigating Cryptocurrencies - Understanding, Extracting, and Analyzing Blockchain Evidence

Malware Analyst's Cookbook and DVD - Tools and Techniques for Fighting Malicious Code

Practical Reverse Engineering - x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Reversing - Secrets of Reverse Engineering

Security Engineering - A Guide to Building Dependable Distributed Systems, 2nd Edition

The Art of Memory Forensics - Detecting Malware and Threats in Windows, Linux, and Mac Memory

The Shellcoder's Handbook - Discovering and Exploiting Security Holes, 2nd Edition

The Web Application Hacker's Handbook - Finding and Exploiting Security Flaws, 2nd Edition

Threat Modeling - Designing for Security

Wireshark for Security Professionals - Using Wireshark and the Metasploit Framework

CEH v9 - Certified Ethical Hacker Version 9 Study Guide

Secrets and Lies - Digital Security in a Networked World, 15th Anniversary Edition

Social Engineering - The Art of Human Hacking

The Art of Deception - Controlling the Human Element of Security

Unauthorised Access - Physical Penetration Testing For IT Security Teams