How to learn cyber security?

In the past six months, I have been sorting out information related to network security. Let me talk about my views on how to get started with network security. Network security has always been on the edge of the law. Familiarize yourself with the "Network Security Law" before getting started . In addition, there are "Internet Security Product Vulnerability Management Regulations", "gj Security Law", "Data Security Law", and "Personal Information Protection Law".

In the basic stage, I suggest to master the Linux operating system first, which is completely free, and in the Linux system, not only Trojan horses and viruses are rare, but even rogue software has almost disappeared.

Of course, if you not only master the Linux operating system, you are also very familiar with the basics of computer networks, and master the basics of SHELL, HTML/CSS, JavaScript, PHP basic syntax, MySQL database, etc.

You can transfer to the stage of infiltration knowledge learning and practical operation. The threshold for infiltration is low. Most of the personnel engaged in the security industry are infiltration positions.

What knowledge do you need to master in the stage of learning penetration testing? I roughly summed it up

  • Penetration and Defense of SQL Injection

  • XSS related penetration and defense

  • Upload Verification Penetration and Defense

  • File contains Penetration and Defense

  • CSRF penetration and defense

  • SSRF penetration and defense

  • XXE Penetration and Defense

  • Remote Code Execution Penetration and Defense

  • Deserialization Penetration and Defense

  • logic loophole

  • Brute Force Guessing and Defense

  • Redis Unauthorized Access Vulnerability

  • AWVS Vulnerability Scanning

  • Appscan vulnerability scan

  • Nessus Vulnerability Scanning

  • MSF-Metasploit Framework

  • social engineering

  • ARP Penetration and Defense

  • System Privilege Escalation Penetration and Defense

  • DOS and DDOS penetration and defense

  • Intranet-related penetration and defense

  • Wireless Security Related Penetration and Defense

  • Trojan horse avoidance problem and defense

  • Vulnhub shooting range combat series

  • Kali Advanced Penetration Testing

Under each knowledge point, a lot of content is subdivided. Due to the limited space, no one reads too much. I have listed the penetration chapter into a complete set of mind maps. If you really want to go deeper Understand, you can follow and check the message I sent you in the background to get this infiltration learning route.

If you have thoroughly learned penetration, you can also find a good job for you. As for more advanced security management and reverse direction, this is another story.

Guess you like

Origin blog.csdn.net/2301_77498991/article/details/130735902