Cyber Training Books

 Web Security 

The book WebApp Security is a Penetration Testing with various approaches to investigative applicability with a broad reference to core topics such as XSS, LFI, RFI, SQL and more.

 

The book was written by company researchers who perform application penetration tests.

 Penetration Testing 

The book Penetration Testing contains intrusion techniques for computer systems, applications, and networking equipment. This book is for people with knowledge of networks, virtual systems, and information security.

 

The book will allow the student to understand the process with professional demonstrations and simple explanations.

 OSINT & DarkNet 

The book of information gathering and the dark web is for anyone interested in the world of information security and wants to learn how to collect information on open and encrypted networks.

 

The book explains from a basic level how fictitious identity can be produced and where sensitive information can be collected.

 Malware Analysis 

The book Malware Analysis and Introduction to Reverse Engineering is designed for people who want to learn how to investigate the damage, suspicious files, and understand the file structure in general.

 

The book will allow the student to understand the process with professional demonstrations and simple explanations.

 Cyber Security 

The book Cyber Security is for anyone interested in the world of information security and wants to learn the secrets of the profession. The uniqueness of this book is an emphasis on practice, which brings the reader to a high level of knowledge, with maximum experience.

 Network Forensics 

The Network Forensics book is for anyone interested in investigating and identifying network attacks. The book allows you to get to know the information that goes through the network in-depth, identify validity and practice the practical understanding.

 Privilege Escalation 

The Privilege Escalation book begins with the access steps and explains in clear and orderly steps on how to achieve full control of the target computer.

The book begins with explanations on Post-Exploitation and continues with advanced methods to identify computer weaknesses to gain maximum control.

 Reverse Engineering 

Reverse Engineering is an advanced book designed for people who want to take their knowledge a few steps forward with a deep and professional understanding of the code lines.

 

The book includes all the exercises that are done in the book so that the student can complete the steps himself.

 Windows Forensics 

The Windows Forensics book is for private investigators and enforcement agencies. This book offers a wide range of tools and techniques to access information found on Windows systems.

The uniqueness of this book is the emphasis on practice and independent learning in a step-by-step method.

 Python Security 

The Python Security Book is built in a gradual manner that takes the student within all relevant cyber libraries. The book begins with closing gaps and proceeds directly into the worlds of automation and factoring.

 

The book includes examples and solutions to advance the student in the Python programming world.

 Mobile Security 

The Mobile Security (Android) book teaches the secrets of exploring the Android world to people who want to learn how to access app exploration and security holes in the above systems.

 

The book explains the steps and tools that we will need to use to gain control over mobile app research.

© 2019 by ThinkCyber

Ze'ev Jabotinsky St 7,

Ramat Gan, IL.

+972-3-9629018

info@ThinkCyber.co.il