The latest network security self-study route on the whole network! none of the most detailed

The online security learning routes searched on major platforms are too rough. . . . can not watch anymore!
I took out the systematic learning route I organized and shared it with you! Click to view detailed roadmap

Suggested order of study:

1. Learning and popularizing the law on network security


1. Understand and introduce the "Network Security Law"
2. "Decision of the Standing Committee of the National People's Congress on Maintaining Internet Security"
3. "Regulations of the People's Republic of China on the Protection of
Computer Information 5. " Administrative
Measures for the Security Protection of International Networking of Computer Information Networks"
6. "Administrative Measures for Internet Information Services"
7. "Administrative Measures for Testing and Sales Licenses for Computer Information System Security Special Products"
8. "Communication "Network Security Protection Management Measures"
9. "National Security Law"
Other laws and regulations HTTPS://WWW.66LAW.CN/LAWS/415664.ASPX

2. Lay a solid foundation, sort out and review

Basics of LINUX system operation and maintenance
1, LINUX service management
2, Docker installation and use
3, LINUX security hardening

Network necessary foundation
1, physical layer
2, data link layer and switch
3, network model OSI TCP peer-to-peer transmission
4, virtual local area network VLAN
5, static routing and configuration
6, network address translation NAT
7, access control list ACL
8, IP protocol and IP address classification
9, subnet mask
10, gateway
11, subnet division

3. HTML and JAVASCRIPT (just understand the grammar, the requirements are not high)


1. Introduction to HTML? Why learn HTML
2. HTML document format, detailed explanation of entities
3. HTML tags, frames, tables, lists, forms, images, background explanations
4. Introduction to JAVASCRIPT
5. Features of JAVASCRIPT
6. Composition of JAVASCRIPT
7. How to Write JAVASCRIPT in the web page

4. Introduction to PHP


1. PHP environment construction, code writing tool selection
2. PHP basic grammar (function, variable, constant, comment, data type, flow control, arithmetic operation) 3.
PHP flow control (IF statement multiple nested SWITCH statement WHILE loop FOR Loop GOTO loop)  PHP function
4, PHP regular expression
5, PHP file upload, PHP error handling
6, PHP operation MYSQL database
7, PHP session management and control

五、MYSQL/MSSQL


1. Database introduction, classification, installation, configuration, login, connection, etc.
2. Basic database operations Create, view, select, check database tables, delete databases and other related command line operations 3. Data
field operations create, modify, add, adjust field order, sort and delete 4. Database table operation
creation, viewing, selection, deletion of database tables and other related command line operations
5. Data type integer, floating point, character, time, matching type, etc.
6. Character set index
7. Addition, deletion, modification and query Update records, database permission operations


6. Key points


02 Hacking Rules

03 Industry Development and Employment Trends of Security Operation and Maintenance Engineers

04 Overview of enterprise-level website attack methods and common Linux systems.

05 Security Introduction / Virus / Malicious Program / Hacker / Intrusion /

06 CentOS7.The x template machine is packaged with system optimization / and attack and defense ring.

07 CentOS7.The x template machine is packaged with system optimization / and attack and defense ring.

08 Offensive and defensive environment construction / DVWA shooting range construction / website front-end technology.

09 Enterprise-level CentOS7. Common commands for x system directory management

10 Enterprise-level CentOS7. X system file operation basic commands

11Enterprise-level CentOS7. VI/VIM text editor in x system

12 Enterprise-level CentOS7. x system file permissions

13 Enterprise-level CentOS7. x system file attributes

14 Enterprise-level CentOS7. x system user management

15 Enterprise-level CentOS7. x system character set, wildcard, special.

16 Enterprise-level CentOS7. x system character set, wildcard, special.

17 Enterprise-level CentOS7. x file compression and file transfer (1)

18 Enterprise-level CentOS7. X system file search practical skills

19Enterprise-level CentOS7. x system timed task/scheduled task

20 Enterprise-level CentOS7. X system disk management and project combat

21 Enterprise-level CentOS7. x network management / and static routing project.

22 Introduction to Web Application Security and Risk for Penetration Testing

23 Web services such as Nginx/Apache/Tomcat for penetration testing.

24 Information collection of penetration testing security tools

25 Vulnerability Scanning of Penetration Testing Security Tools

26 SQL Injection Basics for Penetration Testing (Part 1)

27 Attack Framework of Penetration Testing Security Tools,

28 SQL injection basics of penetration testing (below), tools and POST.

29 Penetration testing asset sorting and Nmap tool introduction

30 SQL injection blind injection for penetration testing

31 SQL injection for penetration testing based on error injection (Part 1)

32 SQL injection for penetration testing based on error injection (Part 2)

33 SQL usage of SQL injection for penetration testing

34 SQL Injection for Penetration Testing and SQL Injection Defense, 35 Essential Tools for Penetration Testing (Part 1)

36 Essential Tools for Penetration Testing (Part 2)

37 Penetration Testing Vulnerability Mining / Vulnerability Scanning

38 Penetration Testing Kali Linux Security Penetration

39 levels of security protection process and penetration test report writing

40 Level Protection of Linux System Security Hardening (Part 1) 41 Introduction to Network Security Cross-site Scripting Attacks of Penetration Testing-XSS.

42 File Upload Vulnerability for Penetration Testing

43 Introduction to Network Security Cross-Site Scripting Attacks of Penetration Testing-XSS.

44 Introduction to Network Security Cross-Site Scripting Attacks of Penetration Testing-XSS.

45 Penetration Testing Network Security Service Request Forgery Vulnerability-CSRF

46 Penetration Test Network Security Service Request Forgery Vulnerability-SSRF, 47 Business Security Copper Leakage Top 10

48 Brute force cracking and verification code security of penetration testing

49 DDoS–DDoS, CC, SYN–Linux three major security attacks.

50 DDoS-Firewall Technology/Shell Programming Technology Practice

51 DDoS – DDoS Security Defense

52 DDoS-DDoS security defense

53 Security - Social Engineering (Part 1)

54 Security - Social Engineering (Part 2)

55 Access Denied Attack and Defense Description-DoS-DDoS, 56 Serialization and Deserialization

57 file upload

58 Social Engineering III

59 Social Engineering IV

60WAF Bypass Penetration and Defense

61 verification code security penetration and defense

62 WEBSHELL Related Penetration and Defense

63 system privilege escalation penetration and defense

64 database privilege escalation penetration and defense

65 Three-party application software security

66ARP Penetration and Defense

67 Intranet related penetration and defense

68 Wireless security-related penetration and defense

69 penetration report writing

70 Trojan Horse Avoidance Problems and Defenses

71windows security series problems

72 levels of protection

73 Risk assessment

74 safety inspection

75 emergency response

76 code audit

7. If you have spare time, you can study


1. ANDROID unpacking and reverse engineering
2. Shell in-depth
3. C in-depth learning
4. C++ in-depth learning
5. Go language
6. JAVA language
7. Windows unpacking and reverse engineering
8. Blockchain
9. CTF in-depth

super hacker

This part of the content is still relatively far away for students with zero foundation, so I won’t go into details, and attach the learning route.

If the picture is too large and compressed by the platform, it cannot be seen clearly.

After following me, the background will automatically send it to everyone! After paying attention, everyone can watch the background news!

Video supporting materials & domestic and foreign network security books, documents & tools

Of course, in addition to supporting videos, various documents, books, materials & tools have been sorted out for you, and they have been classified into categories for you.

Some video tutorials that the author bought by himself, but which are not available on other platforms for free.

SRC&Hacking Technical Documentation

If you want to get involved in hacking & network security, the author has prepared a copy for everyone: 282G the most complete network security data package on the entire network for free! After following me, it will be automatically sent to everyone! After everyone pays attention, just pay attention to the background news~

epilogue

Cybersecurity is a critical issue in today's society. With the rapid development of science and technology, the network has penetrated into every aspect of our lives, bringing us great convenience and opportunities. However, there are also various risks and threats in the network, such as hacker attacks, data leakage, etc. Therefore, learning network security knowledge has become a problem that everyone should pay attention to and pay attention to.

Special statement:

This tutorial is purely technical sharing! The purpose of this tutorial is in no way to provide and technical support for those with bad motives! Nor does it assume joint and several liability arising from the misuse of technology! The purpose of this tutorial is to maximize everyone's attention to network security and take corresponding security measures to reduce economic losses caused by network security. ! ! !

Guess you like

Origin blog.csdn.net/2301_77300311/article/details/131764477