Does the software testing industry have a prospect and a way out?

Table of contents

The perception of a 42-year-old software tester

Computer majors meet love at the corner

Characteristics of the network security industry

1. Learning Roadmap

 2. Video Tutorial

3. Technical documents and e-books

4. Toolkit, interview questions and source code


The perception of a 42-year-old software tester

Twenty years of experience in the testing industry. I have been doing tests since I graduated from university (since 2003).

Currently unemployed, 42 years old.

In the companies I have experienced before, the situation is relatively bad, there are less than 20 people left in the whole company.

But the test can still hold on to at least one pit. It's just that there will be test experts who replace the expensive 211+ big factory background with cheap junior college students.

So what is going to be discussed here is: Why does it give people the illusion that testing is easy to be laid off?

Because these people are comparing with the ten thousand year coolie programmer 9 who is more likely to be laid off.

That is indeed a more secure programmer. When a person who is a senior executive discusses with the boss internally, there will be a saying:

If the company lays off all but junior high school students, who will you keep?

The answer of all bosses must be "Leave a programmer who can work, unless I am a programmer myself."

This is the realistic answer. Therefore, it will be reversed: if there are two people left, who will stay, if there are three people left, who will stay...

At this time, you will find that the position in the test is still relatively high.

As a tester myself, the most extreme situation is that there are only seven people in a company, and I have a position.

And at that time, the company didn't even manage HR administration... 

So many people study software testing, in fact, they have self-knowledge in their mentality, knowing that they can't figure out the program code after racking their brains. Only learning testing has a lower threshold, which is relatively easy to get a job, and the unemployment rate is quite high.

To learn software testing specifically, you must also distinguish how you learned it. If you learn little and avoid programming, then you will naturally lack competitiveness.

Facing the difficulties and greatly improving your programming ability, your competitiveness will also become stronger in the future.

So the question is, how do you transcode? 

 According to the Employment Blue Book, almost all of the top 10 high-paying majors for undergraduate graduates in 2022 are occupied by computer and electronic information majors closely related to IT. Among them, information security ranks first.

Computer majors meet love at the corner

"There is no national security without cybersecurity". At present, network security has been elevated to the height of national strategy and has become one of the most important factors affecting national security and social stability.

Characteristics of the network security industry

1. The employment salary is very high, and the salary rises quickly. In 2021, Liepin.com released the highest employment salary in the network security industry, which is 337,700 yuan per capita!

2. There is a large talent gap and many employment opportunities

On September 18, 2019, the official website of the "Central People's Government of the People's Republic of China" published: my country needs 1.4 million cyberspace security talents, but schools across the country train less than 1.5 million people each year. Liepin.com's "Cyber ​​Security Report for the First Half of 2021" predicts that the demand for cyber security talents will be 3 million in 2027, and there are only 100,000 employees currently engaged in the cyber security industry.

The industry has a lot of room for development and many jobs

Since the establishment of the network security industry, dozens of new network security industry positions have been added: network security experts, network security analysts, security consultants, network security engineers, security architects, security operation and maintenance engineers, penetration engineers, information security management Data Security Engineer, Network Security Operations Engineer, Network Security Emergency Response Engineer, Data Appraiser, Network Security Product Manager, Network Security Service Engineer, Network Security Trainer, Network Security Auditor, Threat Intelligence Analysis Engineer, Disaster Recovery Professional , Actual combat offensive and defensive professionals...

Great career potential

The network security major has strong technical characteristics, especially mastering the core network architecture and security technology in the work, which has an irreplaceable competitive advantage in career development.

With the continuous improvement of personal ability, the professional value of the work will also increase with the enrichment of one's own experience and the maturity of project operation, and the appreciation space is bullish all the way, which is the main reason why it is popular with everyone.

To some extent, in the field of network security, just like the doctor profession, the older you are, the more popular you become. Because the technology becomes more mature, the work will naturally be valued, and promotion and salary increase are a matter of course.

How to Learn Hacking & Cyber ​​Security

 Today, as long as you give my article a thumbs-up, I will share my private collection of online security learning materials with you for free, so let’s see what is there.

1. Learning Roadmap

There are also many things to learn in attack and defense. I have written all the specific things to learn in the roadmap above. If you can learn them, you will have no problem getting a job or taking private jobs.

 2. Video Tutorial

Although there are many learning resources on the Internet, they are basically incomplete. This is a video tutorial on cyber security recorded by myself. I have a supporting video explanation for every knowledge point in the above roadmap.

The content covers the study of network security law, network security operation and other guarantee assessment, penetration testing basics, detailed explanation of vulnerabilities, basic computer knowledge, etc., which are all learning contents that must be known when getting started with network security.

 (It’s all packed into one piece and cannot be unfolded one by one. There are more than 300 episodes in total)

 Due to limited space, only part of the information is shown, you need to click the link below to get it

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

3. Technical documents and e-books

The technical documents are also compiled by myself, including my experience and technical points of participating in large-scale network security operations, CTF and SRC vulnerability mining. There are also more than 200 e-books. Due to the sensitivity of the content, I will not show them one by one.

 Due to limited space, only part of the information is shown, you need to click the link below to get it

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

4. Toolkit, interview questions and source code

"If you want to do a good job, you must first sharpen your tools." I have summarized dozens of the most popular hacking tools for everyone. The scope of coverage mainly focuses on information collection, Android hacking tools, automation tools, phishing, etc. Interested students should not miss it.

There is also the source code of the case and the corresponding toolkit mentioned in my video, which can be taken away if needed.

 Due to limited space, only part of the information is shown, you need to click the link below to get it

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

 Finally, there are interview questions about Internet security that I have sorted out in the past few years. If you are looking for a job in Internet security, they will definitely help you a lot.

These questions are often encountered in interviews with Sangfor, Qi Anxin, Tencent or other major companies. If you have good questions or good insights, please share them.

Reference analysis: Sangfor official website, Qi Anxin official website, Freebuf, csdn, etc.

Content features: clear organization, including graphic representation, which is easier to understand.

Summary of content: Including intranet, operating system, protocol, penetration test, security service, vulnerability, injection, XSS, CSRF, SSRF, file upload, file download, file inclusion, XXE, logic vulnerability, tool, SQLmap, NMAP, BP, MSF...

 Due to limited space, only part of the information is shown, you need to click the link below to get it

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

 

Guess you like

Origin blog.csdn.net/Python_0011/article/details/131138201