Why is network security suddenly "fired"? 2023 Network Security Industry Prospects

Why is network security suddenly "fired"?

As cyberspace becomes the fifth space and social basic industries are fully connected to the Internet, cybersecurity (or information security in a broad sense) is facing more and more threats, and the demand for cybersecurity talents is also showing a blowout trend.

Even though many people can become self-taught at present, "cyberspace security" has become a first-level discipline, but according to the conclusions drawn from the "Eleventh Cyberspace Security Discipline Construction and Talent Cultivation Symposium", "my country's Cyberspace Security Talent Year The training scale is about 30,000 people, and the total number of trained information security professionals is less than 100,000, which is a huge gap from the current demand of 700,000.” According to the joint survey and statistics of Zhaopin and 360 Internet Security Center, in the first half of 2018, the network The security talent demand scale index increased by 44.9% compared with the first half of 2017.

The overall investment in my country's network security is not high. In terms of network security construction, domestic network security investment accounts for less than 3% of informatization investment, while developed countries such as Europe and the United States account for more than 10%, and some even exceed 15%. We are far behind foreign countries in terms of investment scale and awareness of network security. Compared with our digital dependence, this is still a very big contrast.

According to Tencent Security's "Internet Security Report for the First Half of 2017", in recent years, my country's colleges and universities have only trained more than 30,000 information security professionals, while the total demand for network security talents exceeds 700,000, and the gap is as high as 95%.

01 What is Network Security

Network security can be classified based on the perspective of attack and defense. The "red team" and "penetration testing" we often hear are research on attack technology, while the "blue team", "security operation" and "security operation and maintenance" are research on defense technology.

Regardless of the field of network, web, mobile, desktop, cloud, etc., there are two sides of attack and defense. For example, web security technology includes both web penetration and web defense technology (WAF). As a qualified network security engineer, you should be both offensive and defensive. After all, you can win every battle if you know yourself and the enemy.

02 How to plan network security

If you are a newcomer in the security industry, I suggest that you start with network security or web security/penetration testing.

It is worth mentioning that, to learn network security, it is the network first and then the security; to learn web security, it is also the web first and then the security.

Security does not exist independently, but is an upper-layer application technology based on other technologies. Breaking away from this foundation, it is easy to become a theory on paper, and become "knowing what it is, not knowing why it is", and it is difficult to go far on a safe career path.

If you are originally engaged in the operation and maintenance of network workers, you can choose the introduction of network security; if you are originally engaged in program development, it is recommended to choose the introduction of web security/penetration testing. Of course, you have learned a certain degree or have certain work experience. Different directions The technical coupling will become higher and higher, and you need to know a little bit in all directions.

According to the network security skills table above, it is not difficult to see that there are still many technologies that network security needs to be exposed to. Common skills need to be learned: peripheral management capabilities, phishing remote control capabilities, domain penetration capabilities, traffic analysis capabilities, vulnerability mining capabilities, code auditing ability etc.

【----Help learn online security, click here to get all the following learning materials for free!

① Mind map of Internet security learning and growth path
② 60+ classic Internet security toolkits
③ 100+ SRC vulnerability analysis reports ④ The most
authoritative CISSP certification exam guide
⑤ More than 1800 pages of CTF practical skills manual
(with answers)
⑦ APP Client Security Testing Guide (Android+IOS)

03There is a lot of network security knowledge, how to arrange it scientifically and reasonably?

primary

1. Theoretical knowledge of network security (2 days)

① Understand the relevant background and prospects of the industry, and determine the development direction.
②Learn laws and regulations related to network security.
③The concept of network security operation.
④Multiple guarantee introduction, guarantee regulations, procedures and norms. (Very important)

2. Penetration testing basics (one week)

①Penetration testing process, classification, standard
②Information collection technology: active/passive information collection, Nmap tool, Google Hacking
③Vulnerability scanning, vulnerability utilization, principle, utilization method, tool (MSF), bypassing IDS and anti-virus
reconnaissance④ Host attack and defense drills: MS17-010, MS08-067, MS10-046, MS12-20, etc.

3. Basic operating system (one week)

① Common functions and commands of Windows system
② Common functions and commands of Kali Linux system
③ Operating system security (system intrusion troubleshooting/system reinforcement basis)

4. Basics of computer network (one week)

①Computer network foundation, protocol and architecture
②Network communication principle, OSI model, data forwarding process
③Common protocol analysis (HTTP, TCP/IP, ARP, etc.)
④Network attack technology and network security defense technology
⑤Web vulnerability principle and defense: active/ Passive attack, DDOS attack, CVE vulnerability recurrence

5. Basic database operations (2 days)

①Database foundation
②SQL language foundation
③Database security reinforcement

6. Web penetration (1 week)

①Introduction to HTML, CSS and JavaScript
②OWASP Top10
③Web vulnerability scanning tools
④Web penetration tools: Nmap, BurpSuite, SQLMap, others (chopper, missed scan, etc.)

Congratulations, if you learn this, you can basically work in a network security-related job, such as penetration testing, web penetration, security services, security analysis and other positions; if you learn the security module well, you can also work as a security engineer. Salary range 6k-15k

So far, about a month. You've become a "script kiddie". So do you still want to explore further?

7. Script programming (beginner/intermediate/advanced)

In the field of network security. Programming ability is the essential difference between "script kiddies" and real hackers . In the actual penetration testing process, in the face of a complex and changeable network environment, when the common tools cannot meet the actual needs, it is often necessary to expand the existing tools, or write tools and automated scripts that meet our requirements. Some programming ability is required. In the CTF competition where every second counts, if you want to efficiently use self-made scripting tools to achieve various purposes, you need to have programming skills.

For a zero-based entry, it is recommended to choose one of the scripting languages ​​Python/PHP/Go/Java, and learn programming for common libraries; build a development environment and choose an IDE, Wamp and XAMPP are recommended for the PHP environment, and Sublime is strongly recommended for the IDE; Python programming learning , the learning content includes: common libraries such as grammar, regularization, files, network, multi-threading, etc., "Python Core Programming" is recommended, do not read it; ·Use Python to write vulnerability exploits, and then write a simple web crawler; ·PHP basic syntax Learn and write a simple blog system; Familiar with MVC architecture, and try to learn a PHP framework or Python framework (optional); Understand Bootstrap layout or CSS.

8. Super Hacker

This part of the content is still relatively far away for students with zero foundation, so I won’t go into details, and post a general route. Interested children's shoes can be studied, and if you don't know where to go, you can [click here] add me to fuel consumption, and learn and communicate with me.

Network security engineer enterprise-level learning route

If the picture is too large and cannot be seen clearly due to the compression of the platform, you can [click here] add me to send it to you, and everyone can learn and communicate together.

​Some
self-study introductory
books

Some video tutorials that I bought myself, and other platforms can’t get free prostitutes:

epilogue

The network security industry is like a river and lake, where people of all colors gather. Compared with many decent families with solid foundations in European and American countries (understand encryption, know how to protect, can dig holes, and are good at engineering), our talents are more heretics (many white hats may not be convinced), so in the future Talent training and In terms of construction, it is necessary to adjust the structure and encourage more people to do "positive" "system and construction" that combines "business" and "data" and "automation" in order to quench the thirst for talents and truly serve the society in an all-round way. Internet provides security.

Special statement:

This tutorial is purely technical sharing! The purpose of this book is by no means to provide and technical support for those with bad motives! Nor does it assume joint and several liability arising from the misuse of technology! The purpose of this book is to maximize everyone's attention to network security and take corresponding security measures to reduce economic losses caused by network security! ! !

Guess you like

Origin blog.csdn.net/QXXXD/article/details/130052410