Programmers who don't want to be involved, what should they learn?

I really feel like, is this world really leaving a way for computer graduates?

Looking at the students around me, who plan to engage in front-end, JAVA, C, C++, one or two went to apply for the job. Do you think it is after 00 to rectify the workplace?

The truth is that the main focus is a humble: at this stage, learning is the main focus (as long as the salary can survive ); strong learning ability ( let me do anything ); able to withstand pressure ( you can come to work overtime, live in the company )... Highlight a word, Just pay the company to go to work.

It's not that I don't want to roll it, it's that I'm too picky to roll it. I had to find another way to overtake from the network security corner.

Frankly, cybersecurity is so much more comfortable. There is too much talent gap in the entire industry . A rookie like me can receive an interview invitation every time I submit a resume.

In the process of self-learning Internet security, the knowledge of each module is not difficult, but the knowledge involved is too wide. If there is no direction, it is too easy to take detours and the efficiency is particularly low. I just suffered from this and wasted too much time.

Fortunately, I have landed now. During the job hunting process, according to the needs of each position, I summarized the learning route for quick entry. Interested friends can refer to the following:

Step 1: Computer Basics

This first step, in fact, has little to do with network security, but a basic ability that anyone entering the IT field must master. The following five major courses were taught to us by university teachers back then. No matter what technical direction you are in, it is best to learn the technology well. Now it seems that it is still not out of date:

  • computer network
  • Principles of computer composition
  • operating system
  • Algorithms and Data Structures
  • data

In fact, each of these courses has its own universe, and basically it cannot be mastered in one study, but along with everyone's career, different technical stages will have different understandings and feelings. For specific learning, it is recommended to refer to agile development and continue to iterate: have a rough understanding** -> have a further understanding -> thoroughly grasp -> review the past to learn the new. **Don't worry about learning all of one course before moving on to the next one.

Step 2: Programming ability

After having some of the above basic skills, it is time to start writing some codes and hone your programming skills. The following three are the languages ​​that practitioners in the security industry are best able to master:

  • Shell script : master commonly used Linux commands, be able to write simple shell scripts, and handle some simple affairs.
  • C language (C++ optional) : C language has no complicated features. It is the ancestor of modern programming languages. It is suitable for writing low-level software, and it can also help you understand computer knowledge such as memory, algorithms, and operating systems. It is recommended to learn it.
  • Python : C language helps you understand the bottom layer, and Python helps you write functional software such as network, crawler, data processing, and image processing. It is a programming language that programmers, especially hackers, love very much and have to learn.

Step 3: Safety First Experience

With the foundation of the previous two steps, it's time to get in touch with some network security technologies. At this stage, don't circle yourself and only learn technologies in a certain direction. At this stage, my suggestion is: but when dabbling, see the past. Network protocol attack, web service attack, browser security, vulnerability attack, reverse cracking, tool development, etc., to know what it is, to discover your own interests in the process, and let yourself be familiar with various fields of network security. The technology has a preliminary understanding.

Step 4: Divide the direction

In the third step, slowly discover your interest points, whether you like to develop various tools, or like to break into websites, or obsessed with host computer attacks... At this time, you can think about your future direction, and then concentrate on Start to focus on this direction, and continue to cultivate deeply through the technologies in the respective directions in the above mind map, and become a master in a certain field.

What skills do you need to be a qualified network security engineer?

1. Network security technology

Including port, service vulnerability scanning, program vulnerability analysis and detection, rights management, intrusion and attack analysis and tracking, website penetration, virus and Trojan horse prevention, etc.

2. Have an in-depth understanding of computer systems and master commonly used programming languages

For example, windows and linux systems commonly used by enterprises, programming languages ​​such as: Java, php, python, c, c++. Theoretically speaking, more programming languages ​​are better. If you lack energy, you must at least know how to use them frequently.

3. Understand mainstream network security products

Such as firewalls, intrusion detection systems, scanners, etc.

4. Security protocol

Much of the content in this part is interlinked with web security. Familiar with sql injection principle and manual detection, familiar with memory buffer overflow principle and preventive measures, familiar with information storage and transmission security, familiar with data packet structure, familiar with ddos ​​attack types and principles have certain experience in ddos ​​attack and defense, familiar with iis security settings, familiar with ipsec , Group Policy and other system security settings.

5. Machine Learning Algorithms

Machine learning is a science of artificial intelligence. The main research object in this field is artificial intelligence, especially how to improve the performance of specific algorithms in experience learning, involving probability theory, statistics, approximation theory, convex analysis, algorithm complexity theory and many other disciplines.

6. Artificial intelligence

Artificial intelligence is a discipline that studies the use of computers to simulate certain human thinking processes and intelligent behaviors, mainly including the principles of computer intelligence, manufacturing computers similar to human brain intelligence, and enabling computers to achieve higher-level applications. AI will involve disciplines such as computer science, psychology, philosophy, and linguistics. It can be said that almost all disciplines of natural science and social science have gone far beyond the scope of computer science. The relationship between artificial intelligence and thinking science is the relationship between practice and theory. Artificial intelligence is at the level of technical application of thinking science. is an application branch of it.

7. Big data analysis

Big data analysis refers to the analysis of huge data. Big data can be summarized as 4 Vs, large data volume (Volume), fast speed (Velocity), multiple types (Variety), and value (Value). Big data is the hottest vocabulary in the IT industry nowadays, and the subsequent use of data warehouse, data security, data analysis, data mining, etc. around the commercial value of big data has gradually become the focus of profit that people in the industry are vying for.

8. Reverse compilation

Assembly language is the starting point and end point of all programs. After all, all high-level languages ​​are based on assembly. In many high-level languages ​​we need relatively unambiguous syntax, but in assembly, we use some abbreviations and numbers to express programs. To sum it up in one sentence, those of us who engage in network security are simply all-round talents. It is a bit exaggerated to say that we can use pens to secure the world, and martial arts can determine the world.

According to this study plan, if all of them are completed, it will be no problem to just find a promising job or internship.

This plan corresponds to the video tutorials I have also collected:

 

 

Epilogue

To be honest, there is no threshold for obtaining the information package mentioned above.
However, I think many people get it but don't learn it.
Most people's question seems to be " how to act ", but it is actually " can't start" .
This is true in almost any field. The so-called " everything is difficult at the beginning", the vast majority of people are stuck at the first step, and they have eliminated themselves before they even started.
If you really believe you like cybersecurity/hacking, do it now, more than anything else .

The field of network security is like a towering tree full of fruit. There are countless onlookers standing under it. They all claim that they like network security and want to pick the fruit from the tree, but they are hesitant when faced with the vine branches that hang down from time to time. indecision.

In fact, you can climb this tree by just grabbing any vine branch.
What most people lack is such a beginning.

This full version of online security learning materials has been uploaded. If you need it, you can scan the QR code of the CSDN official certification below on WeChat or click the link to get it for free [guaranteed 100% free]

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" for free icon-default.png?t=N5K3https://mp.weixin.qq.com/s/rB52cfWsdBq57z1eaftQaQ

Guess you like

Origin blog.csdn.net/yinjiyufei/article/details/131555745