2023 self-study network security collector's edition route, efficient entry

foreword

[One by one to help with security learning one by one]
①Network security learning route
②20 penetration testing e-books
③357 pages of security attack and
defense notes ④50 security attack and defense interview guides
⑤Security red team penetration toolkit
⑥Network security essential books
⑦100 practical cases of vulnerabilities
⑧Internal video resources of major security companies
⑨Analysis of past CTF capture-the-flag competition questions

01 What is Network Security

Network security can be classified based on the perspective of attack and defense. The "red team" and "penetration testing" we often hear are research on attack technology, while the "blue team", "security operation" and "security operation and maintenance" are research on defense technology.

Regardless of the field of network, web, mobile, desktop, cloud, etc., there are two sides of attack and defense. For example, web security technology includes both web penetration and web defense technology (WAF). As a qualified network security engineer, you should be both offensive and defensive. After all, you can win every battle if you know yourself and the enemy.

02 How to plan network security

If you are a newcomer in the security industry, I suggest that you start with network security or web security/penetration testing.

It is worth mentioning that, to learn network security, it is the network first and then the security; to learn web security, it is also the web first and then the security.

Security does not exist independently, but is an upper-layer application technology based on other technologies. Breaking away from this foundation, it is easy to become a theory on paper, and become "knowing what it is, not knowing why it is", and it is difficult to go far on a safe career path.

**If you are originally engaged in network operation and maintenance, you can choose the direction of getting started in network security; if you are originally engaged in program development, it is recommended to choose the direction of getting started in web security/penetration testing. **Of course, if you have learned a certain degree or have a certain amount of work experience, the technical coupling in different directions will become higher and higher, and you need to know a little bit in each direction.

image.png

According to the network security skills table above, it is not difficult to see that there are still many technologies that network security needs to be exposed to. Common skills need to be learned: peripheral management capabilities, phishing remote control capabilities, domain penetration capabilities, traffic analysis capabilities, vulnerability mining capabilities, code auditing ability etc.

03There is a lot of network security knowledge, how to arrange it scientifically and reasonably?

1. Basic stage

★Network Security Law of the People's Republic of China (including 18 knowledge points)
★Linux operating system (including 16 knowledge points)
★Computer network (including 12 knowledge points)
★SHELL (including 14 knowledge points)
★HTML/CSS (including 44 knowledge points)
★JavaScript (including 41 knowledge points)
★Introduction to PHP (including 12 knowledge points)
★MySQL database (including 30 knowledge points)
★Python (including 18 knowledge points)
——————— ————————
image.png

The first step to getting started is to systematically learn basic computer knowledge, that is, to learn the following basic knowledge modules: operating system, protocol/network, database, development language, and common vulnerability principles. After the previous basic knowledge is learned, it is time to practice.

Because of the popularization of the Internet and informatization, the website system has more external businesses, and the level of programmers is uneven and the configuration of operation and maintenance personnel, so there is more content to be mastered.

2. Penetration stage

■ Penetration and defense of SQL injection (including 36 knowledge points)
■ XSS related penetration and defense (including 12 knowledge points)
■ Upload verification penetration and defense (including 16 knowledge points)
■|The file contains penetration and defense (including 12 knowledge points) knowledge points)
CSRF penetration and defense (including 7 knowledge points)
SSRF penetration and defense (6 knowledge points)
XXE penetration and defense (5 knowledge points)
remote code execution penetration and defense (7 knowledge points) knowledge points)
■…(contains…knowledge points)
———————————————— master the principles, usage, defense and other knowledge of common vulnerabilities. In the web penetration stage, you still need to master some necessary tools.
image.png

The main tools and platforms to master: burp, AWVS, Appscan, Nessus, sqlmap, nmap, shodan, fofa, proxy tools ssrs, hydra, medusa, airspoof, etc. The practice of the above tools can be practiced with the above open source shooting range, which is enough up;

3. Safety management (enhancement)

★ Penetration report writing (including 21 knowledge points)
★ Level protection 2.0 (including 50 knowledge points)
★ Emergency response (including 5 knowledge points)
★ Code audit (including 8 knowledge points)
★ Risk assessment (including 11 knowledge points) points)
★Security inspection (including 12 knowledge points)
★Data security (including 25 knowledge points)
—————————————————
image.png

It mainly includes the preparation of penetration reports, grading of network security level protection, emergency response, code audit, risk assessment, security inspection, data security, compilation of laws and regulations, etc.

This stage is mainly for those who have been engaged in network security-related work and need to be promoted to management positions. If you only study to participate in engineering positions, you can learn or not at this stage.

4. Ascension stage (ascension)

■Cryptography (including 34 knowledge points)
■Introduction to JavaSE (including 92 knowledge points)
■C language (including 140 knowledge points)
■C++ language (including 181 knowledge points)
■Windows reverse engineering (including 46 knowledge points)
■CTF capture the flag (contains 36 knowledge points)
■Android reverse engineering (contains 40 knowledge points)
—————————————————
image.png

Mainly including cryptography, JavaSE, C language, C++, Windows reverse, CTF capture the flag, Android reverse, etc.

It is mainly aimed at the knowledge that needs to be improved to improve the advanced security architecture after already engaged in network security related work.

[One by one to help with security learning one by one]
①Network security learning route
②20 penetration testing e-books
③357 pages of security attack and
defense notes ④50 security attack and defense interview guides
⑤Security red team penetration toolkit
⑥Network security essential books
⑦100 practical cases of vulnerabilities
⑧Internal video resources of major security companies
⑨Analysis of past CTF capture-the-flag competition questions

epilogue

The advice to my friends is to think clearly that there is no shortcut to self-study network security. In comparison, systematic network security is the most cost-effective way, because it can save you a lot of time and energy costs. The advice for self-taught friends is to persevere. Now that you have come to this road, although the future seems to be difficult, as long as you grit your teeth and persevere, you will eventually get the effect you want.

Guess you like

Origin blog.csdn.net/HBohan/article/details/128651757