Self-taught hacker (network security), ordinary people, I advise you to forget it!

The original intention of writing this article is that many friends want to know how to get started/change careers in network security and realize their "hacker dreams". The purpose of the article is to:

1. Point out some misunderstandings in self-study

2. Provide an objective and feasible learning route

3. Recommend resources that I think are suitable for Xiaobai to learn. The big guy detours!

1. What is Cyber ​​Security

Network security can be classified based on the perspective of attack and defense. The "red team" and "penetration testing" we often hear are research on attack technology, while the "blue team", "security operation" and "security operation and maintenance" are research on defense technology.

Regardless of the field of network, web, mobile, desktop, cloud, etc., there are two sides of attack and defense. For example, web security technology includes both web penetration and web defense technology (WAF). As a qualified
network security engineer, one should be both offensive and defensive. After all, only by knowing yourself and the enemy can you win every battle.

2. How to plan network security

If you are a newcomer in the security industry, I suggest that you start with network security or web security/penetration testing.

It is worth mentioning that, to learn network security, it is the network first and then the security; to learn web security, it is also the web first and then the security.

Security does not exist independently, but is an upper-layer application technology based on other technologies. Breaking away from this foundation, it is easy to become a theory on paper, and become "knowing what is, not knowing why", and it is difficult to go far on a safe career path.

If you are originally engaged in the operation and maintenance of network workers, you can choose to get started in the direction of network security; if you are originally engaged in program development, it is recommended to choose the direction of getting started in web security/penetration testing. Of course, after learning a certain degree or having a certain work experience, the technical coupling in different directions will become higher and higher, and you need to know a little bit in each direction.


According to the network security skills table above, it is not difficult to see that there are still many technologies that network security needs to be exposed to. Common skills need to be learned: peripheral management capabilities, phishing remote control capabilities, domain penetration capabilities, traffic analysis capabilities, vulnerability mining capabilities, code
auditing ability etc.

3. There is a lot of network security knowledge, how to arrange it scientifically and reasonably?

(Note: The content listed is the knowledge points from entry to mastery. Except for the basic stage, you can choose to learn according to your own interests and preferences, and you don’t need to learn all of them.)

1. Safety foundation

  • Network security industry and regulations (including 23 knowledge points)
  • Linux operating system (including 81 knowledge points)
  • Computer network (including 27 knowledge points)
  • HTML basics (including 9 knowledge points)
  • PHP basics (including 11 knowledge points)
  • MySQL basics (including 13 knowledge points)
  • Python basics (including 17 knowledge points)

 

Second, the primary penetration

  • Information collection (including 7 knowledge points)
  • Web Security (including 13 knowledge points)
  • Penetration tools (including 9 knowledge points)
  • Vulnerability mining (including 4 knowledge points)
  • Vulnerability reproduction (including 3 knowledge points)

3. Advanced Penetration

  • Penetration framework (contains 3 knowledge points)
  • Privilege escalation (contains 4 knowledge points)
  • Authority maintenance (including 6 knowledge points)
  • Tunnel technology (including 7 knowledge points)
  • Intranet penetration (including 7 knowledge points)
  • Forensics and traceability (including 4 knowledge points)
  • DDos attack and defense (including 5 knowledge points)
  • Wireless Security (including 16 knowledge points)
  • Social Engineering (including 8 knowledge points)
  • ARP penetration (including 7 knowledge points)

4. Security Management

  • Level protection (including 7 knowledge points)
  • Risk assessment (including 11 knowledge points)
  • Emergency response (including 7 knowledge points)
  • Data Security (including 6 knowledge points)
  • Cloud Security (including 6 knowledge points)

5. Code audit

  • Introduction to JavaSE (including 6 knowledge points)
  • Intermediate JavaSE (including 7 knowledge points)
  • Advanced JavaSE (including 7 knowledge points)
  • Java code audit (including 5 knowledge points)
  • PHP code audit (including 5 knowledge points)

6. Binary Security

  • Compilation (including 22 knowledge points)
  • C language (including 11 knowledge points)
  • C++ (including 9 knowledge points)
  • Windows reverse engineering (including 10 knowledge points)
  • Android reverse (including 7 knowledge points)
  • Anti-virus-anti-virus technology (including 20 knowledge points)
  • Webjs reverse (including 14 knowledge points)

7. Advanced programming

  • H5+CSS (including 8 knowledge points)
  • Shell programming (including 14 knowledge points)
  • Golang (including 14 knowledge points)

 Network Security Introductory Notes and Learning Roadmap icon-default.png?t=N4P3https://mp.weixin.qq.com/s?__biz=MzkwNDI0MDc2Ng==&mid=2247483680&idx=1&sn=e1666c9a4a67f1222d90780a0ed619b8&chksm=c08b4a31f7fcc327deef435a3 0bfc550b33b5975f2bcc18dfb2ee20683da66025c68253a4c79#rd

4. Recommended books

  • Kali Linux Penetration Testing Learning Checklist
  • "White Hats Talk about Web Security"
  • "In-Depth Analysis of Web Security"
  • "Metaspolit Penetration Testing Devil Training Camp",
  • "Web Front-End Security Demystified"
  • "Hacking Attack and Defense Technology Collection Web Actual Combat"
  • "SQL Injection Attack Injection Attack and Defense"
  • "XSS cross-site scripting attack analysis and defense"

5. Website recommendation

  • Security technology forums: such as FreeBuf, Kanxue Academy, iSpring and Autumn Forum, etc., provide a wealth of network security information, technical articles and practical sharing.
  • Mooc platforms: such as Coursera, NetEase Cloud Classroom, MOOC, etc., provide online courses and experimental environments related to network security.
  • Youtube channels: such as HackerSploit, thenewboston, etc., launch network security technology tutorials and practice sharing.

 

6. Tool recommendation

  • Wireshark: A packet capture and analysis tool that can be used to analyze network traffic and protocols, and is very helpful for understanding network communication and network security.
  • Nmap: A network scanning tool that can be used to quickly scan the ports and services of the target host to discover vulnerabilities and weaknesses in the network.
  • Metasploit: A penetration testing tool that includes many commonly used attack modules and exploit codes, which can be used to test the security of the system.
  • Burp Suite: A web application penetration testing tool that can be used to intercept, modify and send HTTP requests, and analyze web application vulnerabilities.
  • Hydra: A password cracking tool that can be used to crack commonly used usernames and passwords, test the system's strong password policy and user authentication mechanism.

 7. Some common occupations and positions in the security industry:

  1. Security engineer: Responsible for the planning, design, implementation and maintenance of the network security system to ensure the stability and security of the network system.
  2. Security researcher: responsible for conducting research and analysis on security vulnerabilities, threat intelligence, etc., and providing security consulting and solutions.
  3. Penetration test engineer: Use hacking methods to test the security of network systems and applications, and provide relevant vulnerability repair suggestions.
  4. Security consultant: responsible for providing security consulting and solutions to customers, assessing security risks and threats of customers, and proposing security suggestions and measures.
  5. Security analyst: responsible for analyzing and responding to security incidents, quickly discovering and handling network security issues, and preventing the spread and impact of security incidents.
  6. Security administrator: responsible for the management and maintenance of network security equipment, monitoring the network security situation, discovering and solving security problems in a timely manner.
  7. Safety operation engineer: Responsible for the construction and management of the safety operation system, standardize the safety operation process, and improve the efficiency of safety operation.
  8. Security Product Manager: Responsible for the R&D and marketing of security products, understand market demand and customer feedback, and continuously optimize product performance and functions.
  9. Security legal advisor: responsible for security legal affairs and compliance management, assessing and avoiding security legal risks, and providing security legal advice and services.
  10. Safety education trainer: responsible for the design and teaching of safety training courses, improving employees' safety awareness and skills, and strengthening the construction of corporate safety culture.
     

 8. Some common research in the security industry:

  1. CISSP: Certified Information Systems Security Professional, an international information system security professional certification, is one of the most recognized information security professional certifications in the world, and the certification objects are information security professionals.
  2. CEH: Certified Ethical Hacker, the main content of the certification is hacking technology and security protection technology. It is one of the more famous hacking technology certifications in the world.
  3. CISM: Certified Information Security Manager, information security manager certification, mainly examines the knowledge of information security management, including information security planning, risk management, security operation and security governance.
  4. CISA: Certified Information Systems Auditor, information system auditor certification, mainly examines the knowledge of information system audit and control, including information system security management, risk assessment and compliance audit.
  5. CompTIA Security+: CompTIA Security+ certification is one of the most influential entry-level information security certifications in the world. It mainly examines basic security knowledge and skills.
  6. OSCP: Offensive Security Certified Professional is a certification for penetration testing and vulnerability exploitation that requires a series of practical tests and assessments.
  7. GPEN: GIAC Penetration Tester is an internationally renowned penetration testing certification, which mainly examines network penetration testing skills.
  8. GCIH: GIAC Certified Incident Handler, which is GIAC's certification for security incident response, mainly examines the ability to respond to and deal with security incidents.
     

Network Security Introductory Notes and Learning Roadmap icon-default.png?t=N4P3https://mp.weixin.qq.com/s?__biz=MzkwNDI0MDc2Ng==&mid=2247483680&idx=1&sn=e1666c9a4a67f1222d90780a0ed619b8&chksm=c08b4a31f7fcc327deef435a3 0bfc550b33b5975f2bcc18dfb2ee20683da66025c68253a4c79#rd

Summarize

Learning about cybersecurity requires patience and consistent effort. This learning path is a more comprehensive guide, but it is not the only correct way. In the process of learning, you also need to focus on practice and mastering new technologies, and constantly expand your knowledge and skills in order to better adapt to the rapid development of the security field. Hope this learning route can help you get started with cyber security and gain more growth and development in your future career.
 

Guess you like

Origin blog.csdn.net/qq_35358965/article/details/131209125