Sponsored by Keepnet Labs

Book Reviews

Announcing the experts of my new book

As most of you are already aware , later this year I will release a brand new book which is called " Incident Response in the Age of Cloud" and like in many of my books I dedicate the last chapter to some world famous experts In this book I will have : Orin Thomas : (Microsoft ) Orin has written more [...]


Top 7 must-have cybersecurity books -June 2020

Thank you Info Sec Institute for listing our book in the "Top 7 must-have cybersecurity books" you can read more here Introduction Are you in cybersecurity and are looking to expand your knowledge horizons? Are you getting your start in cybersecurity and looking for a way to immerse yourself in the field before you take your first job? Don’t worry, because [...]


Kevin Mitnick recommends Learn Social Engineering by Erdal Ozkaya

Today I have received an Feedback which made me very happy. One of the very first known Social Engineer' s or Worlds Most known hackers Kevin Mitnick is recommending my book "Learn Social Engineering" in his sessions , conferences as per this e-mail :   "Good Morning (or) Afternoon,  Dr... Hope you are well in the middle of this pandemic. My name is [...]


Book Review by Government Technology

Book Review: Cybersecurity – Attack and Defense Strategies This second edition book provides a great cybersecurity overview for technology and security professionals as well as a needed comprehensive guide for new cyber pros entering the security field. BY DAN LOHRMANN / APRIL 25, 2020 As published at Government Technology  I am often asked to recommend a book that does a good (or great) job at [...]


Review: Cybersecurity – Attack and Defense Strategies

Published in : https://www.helpnetsecurity.com/2020/04/22/review-cybersecurity-attack-and-defense-strategies/ Yuri Diogenes, a professor at EC-Council University and Senior Program Manager at Microsoft, and Dr. Erdal Ozkaya, a prominent cybersecurity professional, advisor, author, speaker and lecturer, published the second edition of their acclaimed book “Cybersecurity – Attack and Defense Strategies”. (more…)


30 Cybersecurity Books to deepen your knowledge by Auth0

30 #Cybersecurity Books to read, recommended by @auth0   I am really happy to see that my book Learn Social Engineering is recommended as 1 of 2 SocialEngineering books by the popular blog / twitter account Auth0  Did you read Learn Social Engineering yet ? https://auth0.com/blog/30-cybersecurity-books-to-deepen-your-knowledge/


Cybersecurity – Attack and Defense Strategies – Second Edition:

Our award-winning and best selling book Cybersecurity Attack and Defense Strategies version 2 with all-new content and 100+ new pages is coming soon to Amazon.com You can pre-order the book right from the below link : Pre Order From Amazon Pre Order From Packt Publishing More info about our book : Cybersecurity - Attack and Defense Strategies - Second Edition: Counter modern threats and [...]


Book Review: Windows Server 2019 Administration Fundamentals

Windows Server 2019 the latest and greatest server operating system from Microsoft, which combines hybrid cloud and cloud-connected workloads into one box and brings a huge list of new and improved capabilities that have been addressed in this book. While Windows Server 2019 is a solid release from Microsoft that is addressing some immediate pain points and provide a firm [...]


Best New Network Administration book

This time not me but a book which I have written the foreword has won an award from Books Authority  .  “Windows Server 2016 Administration Fundamentals: Deploy, set up, and deliver network services with Windows Server while preparing for the MTA 98-365 exam and pass it with ease”, by Bekim Dauti has made it to BookAuthority’s Best New Network Administration books. Congratulations. Key [...]


Forensic investigation of a Social Engineering attack, from real life

In this article I am going to share with you a real Social Engineering attack , where we worked in a case to investigate if there was any forensic evidence to suggest that the laptop computer a) had been compromised by the perpetrator(s), b) if found to be compromised, how, when, and by whom it was compromised, c) [...]