Cybersecurity Guide

  • Bootcamps
  • Degrees
    • Associate in Cybersecurity
    • Bachelor’s in Cybersecurity
    • Master’s in Cybersecurity
    • Graduate Certificate
    • Cybersecurity Analytics Degree
    • Computer science with cybersecurity emphasis
    • MBA in cybersecurity
    • phd in cybersecurity
    • Cybersecurity law degree
  • Online
    • Online Certificate in Cybersecurity
    • online bachelor’s in cybersecurity
    • online IT degree
    • online master’s in cybersecurity
    • Online master’s in information security
    • online phd in cybersecurity
  • CERTIFICATIONS
    • Certified Information Systems Auditor (CISA)
    • Certified Ethical Hacker (CEH)
    • Certified Information Security Systems Professional (CISSP)
    • Certified Information Security Manager (CISM)
    • Digital Forensics Certifications
    • Security+
    • CompTIA Advanced Security Practitioner (CASP+)
    • Certified Network Defender (CND)
    • OSCP
    • CRISC
    • Pen Testing
    • CTIA
    • Cryptography
    • Malware Analyst
  • CAREER GUIDES
    • Security Engineer
    • Chief Information Security Officer
    • Security Analyst
    • Computer Forensics
    • Security Consultant
    • Digital Forensics
    • Cryptographer
    • Security Administrator
    • Penetration Tester
    • Security Software Developer
    • Security Specialist
    • Security Code Auditor
    • Security Architect
    • Malware Analyst
    • Data Protection Officer
    • Cybercrime Investigator
    • Cryptanalyst
    • Security Incident Responder
    • Chief Privacy Officer
    • Risk Manager
    • Network Administrator
    • Business InfoSec Officer
    • Information Security Manager
  • States
    • Alabama
    • Alaska
    • Arizona
    • Arkansas
    • California
    • Colorado
    • Connecticut
    • Delaware
    • Florida
    • Georgia
    • Hawaii
    • Idaho
    • Illinois
    • Indiana
    • Iowa
    • Kansas
    • Kentucky
    • Louisiana
    • Maine
    • Maryland
    • Massachusetts
    • Michigan
    • Minnesota
    • Mississippi
    • Missouri
    • Montana
    • Nebraska
    • Nevada
    • New Hampshire
    • New Jersey
    • New Mexico
    • New York
    • North Carolina
    • North Dakota
    • Ohio
    • Oklahoma
    • Oregon
    • Pennsylvania
    • Rhode Island
    • South Carolina
    • South Dakota
    • Tennessee
    • Texas
    • Utah
    • Vermont
    • Virginia
    • Washington
    • Washington, DC
    • Wisconsin
    • West Virginia
    • Wyoming
  • Podcast
  • Resource Center
    • Centers for Academic Excellence
    • Job Guide
    • Veteran’s Guide
    • Women’s Guide
    • Internship Guide
    • Security Clearance Guide
    • Ethical Hacker Guide
    • Coding for Cybersecurity Guide
    • Cybersecurity 101
    • Student Guide to Internet Safety
    • Scholarship Guide
    • Cybersecurity Math Guide
    • Small Business Guide
    • Cybersecurity for K-12 students
    • Career Networking Guide
    • What is a Cyber Range?
    • Code Like a Hacker
    • Reacting to a Cyber Incident
    • Introduction to Cyber Defense
    • Cybersecurity Courses Online
    • Recommended Reading
    • Phishing Attacks
    • Cybersecurity Responsibility
    • How to Get Into Cybersecurity
    • Cyberwarfare
    • Cybersecurity Insurance
    • Job Interview Prep
    • Readiness Economy
    • Is Cyber a Good Career?
    • What is CyberCorps?
    • DEI in Cyber
    • NIST and Small Business
  • Research
    • AI and Cybersecurity
    • Holiday Hacks
    • Jobs Report
  • Industries
    • Financial Sector
    • Insurance Sector
    • Healthcare Sector
    • Environmental Sector
    • Energy Sector
    • Government Sector
    • Transportation Sector
    • Food and Ag Sector

Highly recommended: A cybersecurity reading list

Written by Cybersecurity Guide Contributors – Last updated: May 5, 2025
In this guide
  • Books
  • Talks
  • Papers/Articles
  • Games
  • Blogs
  • Podcasts
  • Trainings
  • Resources

Whether you are just beginning your cybersecurity career or a seasoned pro, the field is so complex and moving so fast that there is always an opportunity to learn more.

We have talked to more than two dozen cybersecurity experts, including professors, researchers, and heads of industry, and gotten recommendations for the best resources to create your own, personalized cybersecurity library, including books, articles, papers, podcasts, videos, and more. 

“I always tell my students that cybersecurity is an ever-changing field. They need to be aware of that and never stop learning. They must continually apply self-improvement principles.”

— Ryan Sporrer, cybersecurity and digital crime instructor at Western Iowa Tech

Related resources

  • An interview with Ryan Sporrer
  • An interview with Matt Bishop
  • An Interview with Prasad Calyam
  • An interview with Ken Dewey
  • An interview with James Banfield

Here are the cybersecurity reading recommendations from the experts

Resource Author/DomainRecommendation
BOOKS
@WarShane HarrisKen Dewey
Computer and
Internet Security 
Wenliang DuPrasad Calyam
Computer Security:
Art and Science 
Matt BishopMatt Bishop
CryptoSteven LevyKen Dewey
Cult of the Dead Cow:
How the Original Hacking Supergroup Might Just
Save the World
Joseph MennRyan Sporrer
Cybercon: Protecting
Ourselves from
Big Tech & Bigger Lies
James L NorrieTamara Schwartz
Cyber Risk HandbookDomenic AntonucciStan Mierzwa
Cyber SmartBart R McDonoughStan Mierzwa
Daemon (fiction)Daniel SuarezTamara Schwartz
Dark TerritoryFred KaplanDrew Hamilton
Forensic DiscoveryDan Farmer
and Wietse Venema
Drew Hamilton
Foundations of
Cryptography
Oded GoldreichEugene Vasserman
Ghost in the Wires: My Adventures as
the World’s Most
Wanted Hacker
Kevin MitnickRyan Sporrer
HackersSteven LevyKen Dewey
Hacking Exposed (book series)variousRyan Sporrer
Hacking: The Art of Exploitation Jon EriksonJames Banfield
In the PlexSteven LevyKen Dewey
Pentagon BrainAnnie JacobsonKen Dewey
Which Side of History James SteyerYan Solihin
Network Security BibleEric ColeJames Banfield
No Starch Press
cybersecurity book series
variousBill Mahoney
Rules for Radicals Saul AlinskyMatt Bishop
Reveille for RadicalsSaul AlinskyMatt Bishop
Schneier on SecurityBruce SchneierClifford Neuman
Security Engineering Ross AndersonEugene Vasserman
Social Engineering: The
Science of Human Hacking 
Christopher HadnagyHossein Sarrafzadeh
Spam NationBrian KrebsKen Dewey
SuperintelligenceNick BostromKen Dewey
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and DeceiversKevin MitnickRyan Sporrer
The Art of War Sun TzuMatt Bishop
The Code Book Simon SinghYan Solihin/George Markowsky
The Countdown to Zero DayKim ZetterNate Evans
The Cuckoo’s EggCliff StollRyan Sporrer
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber ThreatsRichard A. Clarke
and Robert K Knake
Tamara Schwartz
The Hacker Playbook (series)Peter KimTobi West
The Power of MomentsChip Heath
and Dan Heath
Nate Evans
The PrinceMachiavelliMatt Bishop
The Principles for
Cybersecurity Operations
Hinne HettemaHossein Sarrafzadeh
The Wasp (fiction)Eric Frank RussellMatt Bishop
The Web Application Hacker’s Handbook: Finding and Exploiting Security FlawsDafydd Studdard and
Marcus Pinto
Ryan Sporrer
Tubes: A Journey to the
Center of the Internet
Andrew BlumNate Evans
Unrestricted WarfareQiao Lang and
Wang Xiangsui
Drew Hamilton
Zero Day (fiction)David BaldacciTamara Schwartz
PAPERS/ARTICLES
Cyber Campaigns and
Strategic Outcomes
Journal of
Strategic Studies
Richard Harknett
How to Compete in CyberspaceForeign AffairsRichard Harknett
National Cybersecurity PolicyThe White HouseJoe Scherrer
NIST FrameworkNational Institute
of Standards and
Technology
Ulku Clark
Reflections on Trusting TrustKen ThompsonNate Evans
Sony Pictures: Inside the Hack of the CenturyFortuneJoe Scherrer
The Protection of Information in Computer SystemsJerome H Saltzer
and Michael D Schroeder
Matt Bishop
The Real Story of StuxnetIEEEJoe Scherrer
The Taxonomy of PrivacyUniversity of
Pennsylvania Law
Review, Daniel J Solove
Tobi West
The Untold Story
of NotPetya, the Most Devastating Cyberattack in History
WiredJoe Scherrer
Verizon Data Breach Investigations Report
(DBIR)
VerizonPrasad Calyman
GAMES 
wargamesoverthewire.orgPrasad Calyam
BLOGS
Bruce Schneierschneier.comYan Solihin/George Markowsky
Cyber Defense Magazinecyberdefense
magazine.com
Prasad Calyam
CyberWirethecyberwire.comUlku Clark
Dark Reading darkreading.comRalph Russo
Krebs on Securitykrebsonsecurity.comTobi West
Lawfarelawfareblog.comRichard Harknett
SANS Reading RoomSANS InstituteTobi West
Shira Ovide (NYTimes)nytimes.com/by/
shira-ovide
Ralph Russo
TALKS
Everyday cybercrime – and what you can do about itTED TalkPrasad Calyam
Fighting viruses,
defending the net
TED TalkPrasad Calyam
PODCASTS
Darknet Diariesdarknetdiaries.comLeslie Corbo
Security Nowtwit.tv/shows/
security-now
Leslie Corbo
SpyCastspymuseum.org/
multimedia/spycast/
Greg Gogolin
The Cyberwire
thecyberwire.com
/podcasts
Greg Gogolin
TRAININGS
CCSK All-In-One Exam
Guide by McGraw Hill
Stan Mierzwa
CISSP Official Study
Guide by SYBEX
Stan Mierzwa
Hack This SiteJames Banfield
Hacker Tracker Cyber
Security Workshop Camp
Prasad Calyam
Kali.orgGeorge Markowsky
National Cyber LeagueUlku Clark

More cybersecurity resources

If you are looking for more actionable cybersecurity information, be sure to check out our resource section, which contains popular guides on topics such as:

  • Cybersecurity 101
  • Cybersecurity jobs
  • Cybersecurity certifications
  • Ethical hacker guide

Primary Sidebar

  • Online Programs
    • Master’s
    • Bachelor’s
    • Bootcamps & Certificates
Sponsored Ad
cybersecurityguide.org is an advertising-supported site. Clicking in this box will show you programs related to your search from schools that compensate us. This compensation does not influence our school rankings, resource guides, or other information published on this site.
  • CERTIFICATIONS
    • Azure
    • CASP+
    • CCNA
    • CEH
    • CISA
    • CISM
    • CISSP
    • CRISC
    • Cryptography
    • CTIA
    • CND
    • Forensics
    • Malware Analyst
    • OSCP
    • Pen Testing
    • Security+
  • CAREERS
    • Security Engineer
    • Chief Information Security Officer
    • Security Analyst
    • Computer Forensics
    • Security Consultant
    • Digital Forensics
    • Cryptographer
    • Security Administrator
    • Penetration Tester
    • Security Software Developer
    • Security Specialist
    • Security Code Auditor
    • Security Architect
    • Malware Analyst
    • Data Protection Officer
    • Cybercrime Investigator
    • Cryptanalyst
    • Security Incident Responder
    • Chief Privacy Officer
    • Risk Manager
    • Network Administrator
    • Business InfoSec Officer
    • Information Security Manager
    • Cyber Operations Specialist
  • RESOURCE CENTER
    • Centers for Academic Excellence
    • Job Guide
    • Veteran’s Guide
    • Women’s Guide
    • Internship Guide
    • Security Clearance Guide
    • Ethical Hacker Guide
    • Coding for Cybersecurity Guide
    • Cybersecurity 101
    • Student Guide to Internet Safety
    • Scholarship Guide
    • Cybersecurity Math Guide
    • Small Business Guide
    • Cybersecurity for K-12 Students
    • Career Networking Guide
    • What is a Cyber Range?
    • Code Like a Hacker
    • Reacting to a Cyber Incident
    • Introduction to Cyber Defense
    • Cybersecurity Courses Online
    • Recommended Reading
    • Phishing Attacks
    • Cybersecurity Responsibility
    • How to Get Into Cybersecurity
    • Cyberwarfare
    • Cybersecurity Insurance
    • Job Interview Prep
    • Readiness Economy
    • Is Cyber a Good Career?
    • What is CyberCorps?
    • DEI in Cyber
    • NIST and Small Business
  • RESEARCH
    • AI and Cybersecurity
    • Holiday Hacks
    • Jobs Report
  • INDUSTRIES
    • Financial Sector
    • Insurance Sector
    • Healthcare Sector
    • Environmental Sector
    • Energy Sector
    • Government Sector
    • Transportation Sector
    • Food and Agriculture Sector
Cybersecurity Guide
  • Home
  • Campus Programs
  • About Us
  • Popular Careers
  • Online Programs
  • Terms of Use
  • Resources
  • Programs By State
  • Privacy Policy

Copyright © 2025 · Cybersecurity Guide · All Rights Reserved