ThinkCyber Books

The most popular books in the cyberworld are now in Hebrew.

Introduction to information security, malware analysis and investigations in the Windows forensics.


*Please specify digital-copy or hard-copy

The book Cyber Security is for anyone interested in the world of information security and wants to learn the secrets of the profession. The uniqueness of this book is an emphasis on practice, which brings the reader to a high level of knowledge, with maximum experience.

TIER 1 is an essential course that covers main topics from the cyber world and allows the participants to get a quick view of the complex world of digital crimes. 

Linux Operations book is designed for experienced computer users who have limited or no previous exposure to Linux, whether they are working in an individual or Enterprise environment.

The Network Research book aims to address cyber challenges experienced on the network level. It will cover various attack techniques and how to defend them. 

Those responsible for the initial triage of an incident are the SOC analysts and incident responders; This book covers the necessary skills and practices to train such SOC personnel and successfully operate a modern-day SOC. 

This SOC Operation book is designed for SOC organizations implementing a SOC solution and provides full guidance on the necessary skills and procedures to operate it.


cyber security

XE Basics books.

This training aims for White-Team training, focusing on monitoring and incident response capabilities. ​

*Please specify digital-copy or hard-copy

The Windows Forensics book is for private investigators and enforcement agencies. This book offers a wide range of tools and techniques to access information found on Windows systems.

Network Security book is to discover security vulnerabilities across the entire network by using network hacking techniques and vulnerability scanning. The book explains various types of firewalls for hardening security for both Windows and Linux servers.

Threat Intelligence and OSINT training teach to collect, analyze, and apply targeted cyber intelligence to defensive operations in order to proactively act on sophisticated cyber-attacks.

This Windows Forensics book is part of the NX program and has knowledge relating to real forensics investigations. This book offers a wide range of tools and techniques to access information found on Windows systems and for people wanting to learn in-depth investigations.

Network forensics training is about the analysis of network traffic to identify intrusions or anomalous activity.

The book Penetration Testing contains intrusion techniques for computer systems, applications, and networking equipment. This book is for people with knowledge of networks, virtual systems, and information security.

Linux Forensics is the art of extracting evidence and important artifacts from a digital crime scene that can help the investigator in reconstructing the chain of events.

Many laboratories rely on Python to build basic models for predictions and to run experiments. Python has built-in capabilities to support the digital investigation and protect the integrity of evidence during an investigation.

Cryptography is an indispensable tool for protecting information in computer systems. In this book, you will learn the inner workings of cryptographic systems and how to use them in real-world applications correctly.

Reverse Engineering is a technique used to analyze software to identify and understand its components and its flows. It is a process of understanding code infringement processes and analyzing software weaknesses.

The Malware Analysis book explains the fundamentals of the C and Assembly languages, which is crucial to understand all the processes that are running behind the scenes.



NX Defense books.

This advanced training aims to upgrade cyber teams' knowledge and capabilities. Appropriate for maintaining the professional capabilities of law enforcement and cyber units.

*Please specify digital-copy or hard-copy