It's already 2023, and you still don't know how to learn about network security

foreword

Network security means that the hardware and software of the network system and the data in the system are protected from being damaged, changed, or leaked due to accidental or malicious reasons, the system runs continuously and reliably, and the network service is not interrupted.
Why is cybersecurity important?

As of April 2023, the number of netizens in my country is _1.151 billion_, and the Internet is highly developed. At the same time, the openness of the Internet and the risks posed by security breaches are ubiquitous. Network attacks are becoming more and more complex; hacker attacks are more organized; network attacks against mobile wireless terminals are becoming more and more serious; news about network attacks and data leakage emerges in an endless stream, and network security issues have become the focus of attention of governments, enterprises and users.

Three technical directions of network security

    Security R&
    D Security Research: Binary Direction
    Security Research: Network Penetration Direction

Popular Network Security Jobs
1. Chief Information Officer (CISO)

The CISO is responsible for the overall security posture of the enterprise. They develop and implement security strategies, policies, and security procedures to protect data and systems within the enterprise from cyberattacks. In addition, the CISO oversees the work of other security personnel such as security architects and engineers.
2. Network Security Architect

A network security architect is responsible for designing, developing, and implementing an organization's security infrastructure. They work with the company's CISO to develop a comprehensive security strategy that takes into account not only the company's business goals but also the latest threats. Network security architects also design and oversee the implementation of security controls, such as firewalls, intrusion detection systems, and encryption technologies.
3. Network security engineer

Security engineers are responsible for implementing and maintaining the security foundation within the enterprise. They work closely with network security architects to deploy and configure security controls such as firewalls, intrusion detection systems, and encryption products. Security engineers also regularly conduct security audits within the company to identify security vulnerabilities and recommend solutions to reduce security risks.
4. Security Analyst

Security analysts are responsible for identifying security threats and vulnerabilities in an organization's network. They use a variety of tools, including penetration testing, to simulate attacks and are responsible for evaluating the effectiveness of security measures implemented within the enterprise. In addition, security analysts develop risk mitigation plans for the identified risks.
5. Incident response experts

Incident response experts are responsible for rapid response to security incidents, and are responsible for coordinating internal coordination among various departments of the enterprise when necessary. They need to work with a team of security experts to investigate the cause of the incident, mitigate damage and help the business resume normal operations. At the same time, they also need to develop preventive plans to deal with cybersecurity incidents that may occur at any time in the future.
6. Network security consultant

Network security consultant is a third-party professional security consulting service, which can provide professional advice for enterprises and organizations on how to improve their network security situation. They assess the current security protection level of the enterprise organization, give suggestions, and help the organization further improve its security practice capabilities, and they often provide training on best practice experience in network security for employees of the enterprise organization.
7. Security Awareness Trainer

Security awareness trainers are responsible for educating employees about cybersecurity risks and best practices. They design and deliver training programs to increase awareness of potential threats such as phishing attacks, ransomware, data protection, and more. Security awareness trainers also develop policies and procedures to ensure employees follow best practices.
8. Vulnerability management expert

Vulnerability management specialists are responsible for identifying, assessing, and mitigating cybersecurity risks in an organization. They work closely with security analysts to identify vulnerabilities in an organization's systems and networks. Vulnerability management experts also develop a plan to remediate identified risks.
9. Network security project manager

A cybersecurity program manager is responsible for overseeing the implementation of the cybersecurity program. They work with teams of security experts to plan and execute projects, such as deploying new security controls or creating security awareness training programs. Cybersecurity project managers also track project progress and report their status to senior management.
10. Information Security Manager

Information security managers are responsible for developing and implementing an organization's cybersecurity strategy. Additionally, they work closely with the CISO to ensure all security controls are in place and effective. Information security managers also develop incident response plans and conduct regular security audits.
11. Penetration tester

Penetration testers are responsible for identifying and exploiting security gaps in an organization's systems and networks. They use a variety of tools and techniques for testing, including social engineering, network scanning, and password cracking. Penetration testers often work with ethical hackers to help improve an organization's security posture.
12. Ethical Hacking

Ethical hackers are responsible for conducting security tests on an organization's systems and networks. They use the same tools and techniques as malicious hackers, but they do so with the organization's permission. Ethical hacking helps identify security holes to fix before attackers exploit them.
What exactly does a network security engineer do?
1. Network security technology

Including port, service vulnerability scanning, program vulnerability analysis and detection, rights management, intrusion and attack analysis and tracking, website penetration, virus and Trojan horse prevention, etc.
2. Have an in-depth understanding of computer systems and master commonly used programming languages

For example, windows and linux systems commonly used by enterprises, programming languages ​​such as: Java, php, python, c, c++. Theoretically speaking, more programming languages ​​are better. If you lack energy, you must at least know how to use them frequently.
3. Understand mainstream network network security products

Such as firewalls, intrusion detection systems, scanners, etc.
4. Security protocol

Much of the content in this part is interlinked with web security. Familiar with sql injection principle and manual detection, familiar with memory buffer overflow principle and preventive measures, familiar with information storage and transmission security, familiar with data packet structure, familiar with ddos ​​attack types and principles have certain experience in ddos ​​attack and defense, familiar with iis security settings, familiar with ipsec , Group Policy and other system security settings.
5. Machine Learning Algorithms

Machine learning is a science of artificial intelligence. The main research object of this field is artificial intelligence, especially how to improve the performance of specific algorithms in experience learning, involving probability theory, statistics, approximation theory, convex analysis, algorithm complexity theory and many other disciplines.
6. Artificial intelligence

Artificial intelligence is a discipline that studies the use of computers to simulate certain human thinking processes and intelligent behaviors, mainly including the principles of computer intelligence, manufacturing computers similar to human brain intelligence, and enabling computers to achieve higher-level applications. AI will involve disciplines such as computer science, psychology, philosophy, and linguistics. It can be said that almost all disciplines of natural science and social science have gone far beyond the scope of computer science. The relationship between artificial intelligence and thinking science is the relationship between practice and theory. Artificial intelligence is at the level of technical application of thinking science. is an application branch of it.
7. Big data analysis

Big data analysis refers to the analysis of huge data. Big data can be summarized as 4 Vs, large data volume (Volume), fast speed (Velocity), multiple types (Variety), and value (Value). Big data is the hottest vocabulary in the IT industry nowadays, and the subsequent use of data warehouse, data security, data analysis, data mining, etc. around the commercial value of big data has gradually become the focus of profit that people in the industry are vying for.
8. Reverse compilation

Assembly language is the starting point and end point of all programs. After all, all high-level languages ​​are based on assembly. In many high-level languages ​​we need relatively clear syntax, but in assembly, we use some abbreviations and numbers to express programs. To sum it up in one sentence, those of us who engage in network security are simply all-round talents. It is a bit exaggerated to say that we can use pens to secure the world, and martial arts can determine the world.
How to get started?
One, the first is to lay the foundation! Basics are very important!

    Computer Network
    Computer Composition Principle
    Operating System
    Algorithm and Data Structure
    Database

2. Programming ability

The following three items are the best languages ​​that practitioners in the security industry can master:
Shell script

Master commonly used Linux commands, be able to write simple shell scripts, and handle some simple affairs.
C language (or C++)

C language has no complicated features. It is the ancestor of modern programming languages. It is suitable for writing low-level software. It can also help you understand computer knowledge such as memory, algorithms, and operating systems. It is recommended to learn it.
Python

C language helps you understand the bottom layer, and Python helps you write functional software such as network, crawler, data processing, and image processing. It is a programming language that programmers, especially hackers, love very much and have to learn.
3. Start with cybersecurity skills

Network protocol attack, web service attack, browser security, vulnerability attack, reverse cracking, tool development, etc., to get in touch with it, know what it is, and discover your own interests in the process, so that you can understand various fields of network security. The technology has a preliminary understanding.
4. Determine goals and formulate study plans

Slowly discovering my interests, do I like to develop various tools, or like to hack websites, or are I obsessed with host computer attacks...

At this time, you can think about the direction behind you, and then start to focus on this direction, continue to cultivate along the technology of each direction, and become a leader in a certain field.

The network security study notes + CTF pre-competition documents + network security toolkit shared with you today can be taken by yourself.
how to study

Today, I introduced the industry branch and learning route of network security in detail, so the next question is, I know the industry branch and the learning route, so where can I find my learning resources and what method should I use to learn?
In fact, there are generally two learning methods

One is self-study, which is to find resources and tutorials on the Internet, or find a way to meet some big guys and hold your thighs tightly. Self-study can exercise your self-study ability and improve self-control. It is best to find a full range of learning resources, so that there is no time wasted in connecting back and forth. Make a study plan, and finally you can better check for gaps.

The second is to spend money to find training. Of course, you can’t just find a random company. After all, with the rise of network security, many people with half a barrel of water want to fish in troubled waters. When looking for training institutions, you must start from the strength of teachers, teaching resources and Employment and other aspects to comprehensively consider.

I have also compiled some network security information for you below. If you don’t want to find them one by one, you can refer to these information.

video tutorial

SRC&Hacking Technical Documentation

Hacking Tools Collection

Guess you like

Origin blog.csdn.net/2301_77498991/article/details/130782863