Resources: Books, Learning, and Lessons
The books that made me better at what I do, the learning platforms worth your time, and the tools that didn't survive contact with reality. No affiliate links, no vendor pitches.
Looking for tools and software? My full setup — hardware, software, containers, and dev tools — lives on the /uses page. This page focuses on books, learning paths, and the lessons behind the tools.
🧭 Learning Journey Map
I've been down this rabbit hole since 2005. The path isn't linear — you'll circle back, get distracted by shiny new tools, and occasionally wonder why Docker won't start. That's normal. Here's the progression I wish someone had laid out for me.
Docker, basic monitoring, and one programming language. Don't try to learn everything at once.
Add orchestration, monitoring, and start breaking things intentionally. Security mindset begins here.
Specialize in what interests you. Red team, blue team, DevOps, or just really cool home automation.
📚 Books That Actually Taught Me Something
📖 My Reading Philosophy
I'm a hands-on learner, so books that combine theory with practical exercises work best for me. These aren't affiliate links – just books that made me better at what I do. I've listed them roughly in the order I'd recommend reading them, with personal notes about what makes each special.
Foundation books that build core knowledge
Technical deep dives for specific skills
Stories and context that change how you think
Security Essentials
Technical Deep Dives
📚 START HERE: The Web Application Hacker's Handbook
Read: 2012, re-read: 2023 | Impact: Taught me to think like an attacker. Still reference Chapter 9 (attacking authentication) regularly.
Time investment: ~40 hours spread over 3 months | Value: Foundational. Everything else builds on this.
Read: 2014-2015, ~80 hours total | Setup time: 8 hours building isolated analysis environment
Learned: Reverse engineering, PE file structure, behavioral analysis | Still use: IDA Free for quick binary analysis
📗 Network Security Through Data Analysis
Turn packet captures into intelligence. This book taught me to think like data, not just look at it. Great for building SIEM detection rules.
Cheat codes for pentesters. Keep this handy during engagements. Not for learning fundamentals, but great for quick reference when you're in the thick of it.
Mind-Expanding Reads
📚 START HERE: The Cuckoo's Egg
The OG hacker hunt story. Written in 1989 but feels modern. Shows that good investigative techniques are timeless. Made me appreciate the detective work in security.
📕 Sandworm
Nation-state hacking that puts cybersecurity in a geopolitical context. Understanding state-level cyber warfare helps you think bigger than just technical vulnerabilities.
Kevin Mitnick's wild ride. Shows that social engineering often beats technical attacks. Changed how I think about human factors in security.
The hackers who shaped the internet. Great for understanding the culture and ethics that drive security research. Made me appreciate the history behind modern tools.
Homelab & DevOps
Level Up Your Lab
-
🔧 The Phoenix Project
DevOps explained through a story that hits too close to home -
⚙️ Site Reliability Engineering
How Google does it (free online too!)
-
🐳 Docker Deep Dive
Actually understand containers -
☸️ The Kubernetes Book
K8s without the pain
💀 The Graveyard: Tools That Didn't Make the Cut
🪦 Learn from My Mistakes
Not every tool is a winner. Here are some that looked promising but didn't survive contact with reality. Learning what doesn't work is just as valuable as finding what does.
OpenShift (for homelab)
Tried: Q2 2022, abandoned after 2 months
Cost: $0 but ~40 hours wasted
Why I tried it: Red Hat magic, enterprise features, impressive demos
Why it failed: Minimum 4 cores + 16GB RAM per node. Ate 64GB of my 256GB total RAM. K3s does
90% for 10% of resources.
What I learned: Enterprise tools don't scale down. Use tools designed for your scale.
Jenkins (for simple CI/CD)
Why I tried it: Industry standard, huge plugin ecosystem
Why it failed: Configuration nightmare. Spent more time maintaining Jenkins than using it.
GitLab CI or Drone CI work better for small projects.
Full ELK Stack (personal use)
Why I tried it: Industry standard logging
Why it failed: Java memory hog for homelab scale. Loki + Grafana gives 80% of the value with
20% of the complexity.
OSSEC (before Wazuh)
Why I tried it: Free SIEM solution
Why it failed: Configuration by editing XML files. In 2023. Wazuh is what OSSEC should have
become.
💡 The pattern: Complex enterprise tools often don't scale down well to homelab environments. Look for tools designed for simplicity first, then scale up if needed. See my /uses page for the tools that did make the cut.
🎮 Fun Homelab Projects
Because learning should be fun, here are some projects that'll teach you tons:
Weekend Warriors
🍯 Build a Honeypot Network
Deploy T-Pot and watch the internet try to hack you. Grab popcorn.
🔐 Red Team Lab
Set up GOAD (Game of Active Directory) and practice your pentest skills.
📡 WiFi Pineapple DIY
Build your own with a Raspberry Pi and Wifiphisher. Test your network's security.
🎓 Learning Platforms Worth Your Time
🎯 My Learning Strategy
I learn best by doing, failing, and trying again. Start with free platforms to find what clicks for you, then invest money in areas where you want to go deeper.
Free Stuff That's Actually Good
Hands-On Labs
🎯 OverTheWire - Start with Bandit, thank me later
Started: November 2010, still recommend | Lessons: Linux basics, SSH, bash scripting, basic crypto | Progression: Bandit → Leviathan → Natas → Krypton
🏴 PicoCTF - Beginner-friendly CTF
Designed for high schoolers but perfect for adults learning fundamentals. Hint system prevents frustration.
🔓 PortSwigger Academy - Free web security training
Made by the Burp Suite team. Interactive labs that teach real vulnerabilities.
YouTube Channels
📺 IppSec - HTB walkthroughs that teach methodology, not just answers
🎬 John Hammond - CTFs and malware analysis with clear explanations
🎥 NetworkChuck - Makes networking fun, great for homelab inspiration
📹 LiveOverflow - Deep technical dives into the "why" behind exploits
Worth Paying For
TryHackMe - Guided learning path ($10/month)
Active: 2020-2023, 180+ rooms completed | Best path: Pre Security → Complete Beginner → Offensive Pentesting | Perfect for beginners: Guided paths prevent you from getting lost.
HackTheBox - More challenging ($20/month)
Current VIP subscriber | Boxes completed: 47 easy, 23 medium, 8 hard | Reality check: Medium boxes take 6-12 hours each. No hand-holding. The forums and Discord are where the real learning happens.
TCM Security - Practical courses (varies)
Real-world focused. Heath Adams knows his stuff. Best for the PNPT certification path or structured learning without fluff.
💡 My recommendation: Start with TryHackMe for 3-6 months, then add HackTheBox. Don't jump around – depth beats breadth when you're learning fundamentals.
🚨 Security News & Intel
Daily Reads
Threat Intel
Vulnerability Feeds
⚠️ A Reminder
Ethics first: Only hack what you own or have explicit permission to test.
Learn responsibly: Understand the impact of your actions.
Back up everything: Seriously. Back up your backups.
Document your journey: Your future self will thank you.
Last verified: 2026-03-12. Tool versions and metrics are checked periodically.