foreword
Network security engineers are also called information security engineers. With the development of the Internet and the popularization of IT technology, the network and IT have gradually penetrated into daily life and work. Social informatization and information networking have broken through the barriers of time and space in the application of information, and the value of information has continued to increase. But at the same time, information security incidents such as webpage tampering, computer viruses, illegal system intrusion, data leakage, website deception, service paralysis, and illegal use of loopholes occur from time to time.
Mainly responsible for the information security management system and standard work, preventing hacker intrusion and conducting analysis and prevention, through the use of various security products and technologies, setting up firewalls, anti-virus, IDS, PKI, offensive and defensive technologies, etc. Personnel who carry out security system and security technology planning, daily maintenance management, information security inspection and audit system account management and system log inspection, etc. To pursue a career in cybersecurity engineering. First of all, there must be technology. Although the network security engineers we usually see are sitting and working, but if you want to engage in this profession for a long time, you must have a certain technical content.
Then let me give you a look at the syllabus of employment and study courses for network security, please bookmark it! ! !
operating system basics
Unix/Linux OS
Windows OS
Part of the first stage
network foundation
1. Network classification
2. Transmission medium
network model
Network protocol
Contents of the second part
Web Application Basics
1.HTTP/HTTPS/SSL/80/443/8080
2.HTML
3. CSS
4.JavaScript
5. JSON data format
6. Basics of PHP programming
7.MySQL or MSSQL
penetration testing
1. Web application security and risk
2. Web application technology
3. Security Tools - Information Collection
4. Security Tools - Vulnerability Scanning
5. SQL injection attack technology
6. XSS cross-site scripting attack
7. Upload verification bypass technology
8. File Contains Vulnerabilities
9. CSRF attack technology
10. Remote Code Execution Vulnerabilities
11. XXE Principle Exploitation Defense
12. Editor Vulnerabilities
13. Brute force guessing
14. Violent verification code security
15. Logical loopholes
16. Business Security Issues
17. Generate Penetration Test Report
18. Partial/too many are listed for reasons of space
code audit
Class protection
1. What is hierarchical protection
2. Development history of graded protection
3. Why do we need hierarchical protection
4. Hierarchical protection in cybersecurity law
5. Relevant standards for graded protection
6. Role in the construction of hierarchical protection
7. Workflow of Hierarchical Protection
Safety inspection
1. Sales section
2. Pre-sales section
3. Implementation part
Emergency Response
1. What is emergency response
2. Emergency Response Workflow
3. Emergency response implementation process
4. Emergency response investigation method
5. Linux system actual combat
6. Windows system combat
7. Web combat projects
project screenshot
1. Complete Security Penetration Test Documents/Real Projects/Penetration Projects for 5.5 billion online car-hailing projects
2. Vulnerability library / digging is not limited to Top 10
3. Guaranteed projects
4. Net protection projects/classes can participate in net protection every year (more than 7280 courses can participate)
5. Online teaching experiment cloud platform/online shooting range (free trial for courses above 7280)