I see this referenced all the time. I haven't finished it myself, but from what I've read it's great.
$10 if you get the kindle version. https://www.amazon.com/Think-Like-Manager-CISSP-Exam-ebook/dp/B08D9L1BTF/ref=tmm_kin_swatch_0?_encoding=UTF8&qid=1619647039&sr=8-2
This is oddly reminiscent of Clifford Stoll's The Cuckoo's Egg, written back in the days before the term "cybercrime" had even been coined, let alone become outdated. It was the same problem of finding somebody who had the necessary combination of jurisdiction and interest to take action while he plugged along with his amateur investigation.
As an aside, one of the critics, Clifford Stoll, was an early Internet adopter who almost-singled handedly cracked one of the first network hacking cases that lead to the arrest and convection of a West German agent working for the KGB. He wrote a book about. Ripping good yarn.
There are lots of videos on YT. I personally liked this one:
You can also read: Decode and Conquer: Answers to Product Management Interviews. https://www.amazon.com/dp/B07ZV8BM2S/ref=cm_sw_r_apan_glt_8DZAN5FX2EHNGRA93XZB
Gibson, not Neil. I bought Neil,
The last I passed post I saw was listing this one, and the two below both have online practice material..
And how are those the top two , when Meyers is 5 stars....?
​
But even more technical is the Pearson exam cram, but if you want the book dont buy it off of Amazon but the Pearsonit site,
Even partners have to pay for that.
A cheaper option is to buy these:
and
https://www.amazon.ca/gp/product/B08B7N7P2X/ref=dbs_a_def_rwt_hsch_vapi_taft_p1_i1
A good friend wrote this - he works for Fortinet. Pretty solid training guide.
I'm sorry to read that your preparation was not enough, or perhaps you entered the exam with the wrong mindset? The positive side is that at least you know what to expect next time, so you will enter the room with less emotions. Have you thought how to approach this exam differently next time? Perhaps this book might be useful for you: https://www.amazon.com/Think-Like-Manager-CISSP-Exam-ebook/dp/B08D9L1BTF
I came across some positive comments around it but myself didn't have enough time to go through.
Good luck, don't lose hope. You are one step away from it, just requires a bit of different thinking and luck. Yes luck. As many say there comes a point where you just gamble, myself I gambled at least 20% of the time. I was not sure at all. I picked two answers which made more sense to me and gambled.
I recommend "Hacking: the art of exploitation" (it also teaches a lot of c). Why? Because I have written c for years but reading it felt like starting from scratch, the right way! The best thing is it explains all the security pitfalls really clearly and how to spot them. Given all the bad code out there I think security is really a better place to start than networking.
It's also fun, learning through puzzles spotting bugs - instead of copy-pasting yet another "hello world, TCP/IP edition! (now with added monotony)"
Last but not least, it explains the architecture underlying c code, which imo is vital - direct access to the machine & OS is the main advantage of coding in c, so why not learn that?
https://www.amazon.co.uk/gp/product/B004OEJN3I/ref=dbs_a_def_rwt_hsch_vapi_tkin_p1_i2
https://handlers.sans.org/tliston/ThwartingVMDetection_Liston_Skoudis.pdf
This is it but you could also patch the instructions with nops instead of jumping with a little understanding of asm. Its good to learn.
This book is a gold mine:
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware https://www.amazon.com/dp/B073D49Q6W/ref=cm_sw_r_cp_api_6fWVBb5VJV91Z
Hope it helps.
The other replies have shown you what it is used for in astronomy. If you want a fascinating real-world example of what else it is used for, check out Clifford Stoll's book The Cuckoo's Egg:
>Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"—a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases—a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
PBS did a really cheesy (but good) documentary of his book if you want a taste before you dive all the way in, but the book is better.
I often perform malware analysis on home machines, and business machines. I've inspected numerous machines where the owner thought they were secure and virus free, only to find they're infected with malware.
Some malware are blatant. Others are not so easy to spot, and are easily missed by AV's. They say most computers are part of a botnet, and I believe this to be true. Most users would never notice though.
A virus uses the same Windows API's (excluded Mac and Linux in this example) as normal non malicious software. Add a packer/obfuscation and even static malware analysis becomes difficult. Malware will never disappear unless they change the architecture of systems. But, even then, attackers would find ways around it.
How many average users know how to inspect Windows Services for malware for example? Windows Services allow an attacker to run as Local System, which is very dangerous and can be used to bypass many security restrictions on Windows machines. The average Joe simply doesn't have a clue and will happily dismiss UAC dialogs so they can install whatever it is they've downloaded.
Anyone interested in learning more about analyzing their machine for malware should check out this book: www.amazon.co.uk/Practical-Malware-Analysis-Hands--Dissecting-ebook/dp/B007ED2XDS/ref=sr_1_4?ie=UTF8&qid=1451143144&sr=8-4&keywords=malware
I bought mine directly through my kindle.