| 1 |
|
Malware Analysis Techniques: Tricks for the triage of adversarial software
by
4.11 avg rating — 9 ratings
|
|
| 2 |
|
Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career
by
4.18 avg rating — 57 ratings
|
|
| 3 |
|
Cyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
by
4.09 avg rating — 34 ratings
|
|
| 4 |
|
Microsoft Azure Security Technologies Certification and Beyond: Gain practical skills to secure your Azure environment and pass the AZ-500 exam
by
4.33 avg rating — 3 ratings
|
|
| 5 |
|
Mastering Palo Alto Networks: Deploy and manage industry-leading PAN-OS 10.x solutions to secure your users and infrastructure
by
4.67 avg rating — 9 ratings
|
|
| 6 |
|
Microsoft 365 Security Administration: MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
by
3.92 avg rating — 13 ratings
|
|
| 7 |
|
Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats
by
3.70 avg rating — 10 ratings
|
|
| 8 |
|
Learn Wireshark: Confidently navigate the Wireshark interface and solve real-world networking problems
by
really liked it 4.00 avg rating — 10 ratings
|
|
| 9 |
|
CompTIA Security+: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt
by
4.53 avg rating — 51 ratings
|
|
| 10 |
|
Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 protocols to secure applications
by
3.95 avg rating — 22 ratings
|
|
| 11 |
|
The Ultimate Kali Linux Book
by
4.17 avg rating — 12 ratings
|
|
| 12 |
|
Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
by
4.32 avg rating — 37 ratings
|
|
| 13 |
|
Industrial Cybersecurity: Efficiently secure critical infrastructure systems
by
4.09 avg rating — 23 ratings
|
|
| 14 |
|
Mastering Microsoft Endpoint Manager: Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs
by
3.50 avg rating — 8 ratings
|
|
| 15 |
|
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
by
4.17 avg rating — 29 ratings
|
|
| 16 |
|
Mastering Defensive Security
by
4.50 avg rating — 2 ratings
|
|
| 17 |
|
Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
by
4.56 avg rating — 9 ratings
|
|
| 18 |
|
Mastering Kali Linux for Advanced Penetration Testing
by
4.14 avg rating — 36 ratings
|
|
| 19 |
|
Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
by
4.12 avg rating — 69 ratings
|
|
| 20 |
|
Pentesting Industrial Control Systems: An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
by
4.75 avg rating — 4 ratings
|
|
| 21 |
|
Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems
by
3.91 avg rating — 11 ratings
|
|
| 22 |
|
Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software
by
4.17 avg rating — 12 ratings
|
|
| 23 |
|
Practical Hardware Pentesting: A guide to attacking embedded systems and protecting them against the most common hardware attacks
by
really liked it 4.00 avg rating — 10 ratings
|
|
| 24 |
|
Threat Hunting with Elastic Stack: Solve complex security challenges with integrated prevention, detection, and response
by
3.75 avg rating — 4 ratings
|
|