Skip to main content

Resources: Books, Learning, and Lessons

The books that made me better at what I do, the learning platforms worth your time, and the tools that didn't survive contact with reality. No affiliate links, no vendor pitches.

Looking for tools and software? My full setup — hardware, software, containers, and dev tools — lives on the /uses page. This page focuses on books, learning paths, and the lessons behind the tools.

🧭 Learning Journey Map

I've been down this rabbit hole since 2005. The path isn't linear — you'll circle back, get distracted by shiny new tools, and occasionally wonder why Docker won't start. That's normal. Here's the progression I wish someone had laid out for me.

🌱 Start Here

Docker, basic monitoring, and one programming language. Don't try to learn everything at once.

🚀 Build Momentum

Add orchestration, monitoring, and start breaking things intentionally. Security mindset begins here.

🔬 Go Deep

Specialize in what interests you. Red team, blue team, DevOps, or just really cool home automation.

📚 Books That Actually Taught Me Something

📖 My Reading Philosophy

I'm a hands-on learner, so books that combine theory with practical exercises work best for me. These aren't affiliate links – just books that made me better at what I do. I've listed them roughly in the order I'd recommend reading them, with personal notes about what makes each special.

📚 Start Here

Foundation books that build core knowledge

🔬 Go Deeper

Technical deep dives for specific skills

🧠 Perspective

Stories and context that change how you think

Security Essentials

Technical Deep Dives

📚 START HERE: The Web Application Hacker's Handbook

Read: 2012, re-read: 2023 | Impact: Taught me to think like an attacker. Still reference Chapter 9 (attacking authentication) regularly.

Time investment: ~40 hours spread over 3 months | Value: Foundational. Everything else builds on this.

📕 Practical Malware Analysis

Read: 2014-2015, ~80 hours total | Setup time: 8 hours building isolated analysis environment

Learned: Reverse engineering, PE file structure, behavioral analysis | Still use: IDA Free for quick binary analysis

📗 Network Security Through Data Analysis

Turn packet captures into intelligence. This book taught me to think like data, not just look at it. Great for building SIEM detection rules.

📙 RTFM: Red Team Field Manual

Cheat codes for pentesters. Keep this handy during engagements. Not for learning fundamentals, but great for quick reference when you're in the thick of it.

Mind-Expanding Reads

📚 START HERE: The Cuckoo's Egg

The OG hacker hunt story. Written in 1989 but feels modern. Shows that good investigative techniques are timeless. Made me appreciate the detective work in security.

📕 Sandworm

Nation-state hacking that puts cybersecurity in a geopolitical context. Understanding state-level cyber warfare helps you think bigger than just technical vulnerabilities.

📗 Ghost in the Wires

Kevin Mitnick's wild ride. Shows that social engineering often beats technical attacks. Changed how I think about human factors in security.

📙 Cult of the Dead Cow

The hackers who shaped the internet. Great for understanding the culture and ethics that drive security research. Made me appreciate the history behind modern tools.

Homelab & DevOps

Level Up Your Lab

💀 The Graveyard: Tools That Didn't Make the Cut

🪦 Learn from My Mistakes

Not every tool is a winner. Here are some that looked promising but didn't survive contact with reality. Learning what doesn't work is just as valuable as finding what does.

OpenShift (for homelab)

Tried: Q2 2022, abandoned after 2 months
Cost: $0 but ~40 hours wasted
Why I tried it: Red Hat magic, enterprise features, impressive demos
Why it failed: Minimum 4 cores + 16GB RAM per node. Ate 64GB of my 256GB total RAM. K3s does 90% for 10% of resources.
What I learned: Enterprise tools don't scale down. Use tools designed for your scale.

Jenkins (for simple CI/CD)

Why I tried it: Industry standard, huge plugin ecosystem
Why it failed: Configuration nightmare. Spent more time maintaining Jenkins than using it. GitLab CI or Drone CI work better for small projects.

Full ELK Stack (personal use)

Why I tried it: Industry standard logging
Why it failed: Java memory hog for homelab scale. Loki + Grafana gives 80% of the value with 20% of the complexity.

OSSEC (before Wazuh)

Why I tried it: Free SIEM solution
Why it failed: Configuration by editing XML files. In 2023. Wazuh is what OSSEC should have become.

💡 The pattern: Complex enterprise tools often don't scale down well to homelab environments. Look for tools designed for simplicity first, then scale up if needed. See my /uses page for the tools that did make the cut.

🎮 Fun Homelab Projects

Because learning should be fun, here are some projects that'll teach you tons:

Weekend Warriors

🍯 Build a Honeypot Network

Deploy T-Pot and watch the internet try to hack you. Grab popcorn.

🔐 Red Team Lab

Set up GOAD (Game of Active Directory) and practice your pentest skills.

📡 WiFi Pineapple DIY

Build your own with a Raspberry Pi and Wifiphisher. Test your network's security.

🎯 Malware Analysis Lab

Set up REMnux and FLARE-VM for safe malware analysis.

🎓 Learning Platforms Worth Your Time

🎯 My Learning Strategy

I learn best by doing, failing, and trying again. Start with free platforms to find what clicks for you, then invest money in areas where you want to go deeper.

Free Stuff That's Actually Good

Hands-On Labs

🎯 OverTheWire - Start with Bandit, thank me later

Started: November 2010, still recommend | Lessons: Linux basics, SSH, bash scripting, basic crypto | Progression: Bandit → Leviathan → Natas → Krypton

🏴 PicoCTF - Beginner-friendly CTF

Designed for high schoolers but perfect for adults learning fundamentals. Hint system prevents frustration.

🔓 PortSwigger Academy - Free web security training

Made by the Burp Suite team. Interactive labs that teach real vulnerabilities.

YouTube Channels

📺 IppSec - HTB walkthroughs that teach methodology, not just answers

🎬 John Hammond - CTFs and malware analysis with clear explanations

🎥 NetworkChuck - Makes networking fun, great for homelab inspiration

📹 LiveOverflow - Deep technical dives into the "why" behind exploits

Worth Paying For

TryHackMe - Guided learning path ($10/month)

Active: 2020-2023, 180+ rooms completed | Best path: Pre Security → Complete Beginner → Offensive Pentesting | Perfect for beginners: Guided paths prevent you from getting lost.

HackTheBox - More challenging ($20/month)

Current VIP subscriber | Boxes completed: 47 easy, 23 medium, 8 hard | Reality check: Medium boxes take 6-12 hours each. No hand-holding. The forums and Discord are where the real learning happens.

TCM Security - Practical courses (varies)

Real-world focused. Heath Adams knows his stuff. Best for the PNPT certification path or structured learning without fluff.

💡 My recommendation: Start with TryHackMe for 3-6 months, then add HackTheBox. Don't jump around – depth beats breadth when you're learning fundamentals.

🚨 Security News & Intel

⚠️ A Reminder

Ethics first: Only hack what you own or have explicit permission to test.

Learn responsibly: Understand the impact of your actions.

Back up everything: Seriously. Back up your backups.

Document your journey: Your future self will thank you.

Last verified: 2026-03-12. Tool versions and metrics are checked periodically.