Knowledge Base

RedTeam Security Book Makes Top 10 Must-Reads By TechWorm

Written by
Jeremiah Talamantes

Thank you TechWorm for adding our book to this awesome list of Information Security Professional must-reads!

Information Security Professionals

10 Books That Information Security Professionals Must Read

1. Metasploit: The Penetration Tester’s Guide – By David Kennedy, Jim O’Gorman, Devon Kearns, Mati Aharoni

2. Hacking: The Art of Exploitation, 2nd Edition – By Jon Erickson

3. Gray Hat Hacking: The Ethical Hacker’s Handbook – By Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Limm, and Stephen Sims

4. The Phoenix Project – By Gene Kim, Kevin Behr, and George Spafford

5. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker – By Kevin Mitnick

6. Cryptography Engineering – By Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno

7. Hacking Exposed 7: Network Security Secrets and Solutions – By Stuart McClure, Joel Scambray, George Kurtz

8. Offensive Countermeasures: The Art of Active Defense – By John Strand, Paul Asadoorian, Ethan Robish, Benjamin Donnelly

9. The Social Engineer’s Playbook: A Practical Guide to Pretexting – By Jeremiah Talamantes

10. Visible Ops Security: Achieving Common Security And IT Operations Objectives In 4 Practical Steps – By Gene Kim, Paul Love, and George Spafford

Full-Force Red Team Training

Red Team Training Full Force

Interested in learning how to carry out Red Team Operations? Learn how to discover Technical, Social and Physical security vulnerabilities and effectively improve the security posture of your organization. Register now!

Featured On

National TV news and media outlets often consult with us for our expertise as a boutique, high-touch ethical hacking firm highly trained in a narrow field of cybersecurity. Please click on any logo below to view the featured story.

Get your FREE security evaluation today. Learn how our experts can reduce your organization's security risk

Test the effectiveness of your own security controls before malicious parties do it for you. Our security experts are here to help — schedule a call today.