In the era of ChatGPT explosion, which one is better for artificial intelligence or network security?

I think network security would be better

In fact, after reading a lot of theories, I feel that they are all immature or carry private goods. I have a bachelor's degree in information security and am currently working as a corporate red army for a Party A.

If you choose artificial intelligence, how about your academic qualifications? Is it 985/211 for undergraduate? Do you have plans to study in graduate school? Do you have friends who are engaged in the profession of artificial intelligence? Do you know the top team of artificial intelligence in China? Have you participated in various international competitions and won awards or rankings? Do you understand the atmosphere and circle of artificial intelligence learning in China? Do you understand all these questions?

Therefore, in comparison, I recommend choosing to study network security

Network security is not only about offense and defense. If you insist on offense and defense, I also start with offense and defense. Some people say that it is difficult to get started. One day can pull the web through, including not limited to the normal web penetration thinking process, information collection, web tool use, some waf confrontation, what is fuzzing, and various vulnerabilities. It is a simple script boy, which takes 15 days Unify the foundation of the intranet, build a domain environment by yourself, one control, one sqlserver, one owa, one personal pc, 4 machines are enough to reproduce the environment of the intranet, including but not limited to ms17010, relay, constrained delegation, adcs , all kinds of intranet cve, tools msf, cs and various powershell tools, 2 weeks can not be said to be proficient, but it is more than enough to let you figure out what it is for and how to use it. As for the current offensive and defensive environment, basically The supply chain and all kinds of 0days, (this type of vulnerability is mostly java, because whether it is hw or internal offensive and defensive drills, current products are mostly developed in java) phishing, cloud security confrontation, when you accumulate After what I said before, you can go to practice, as for the intranet, it will take time to accumulate.

Of course, the above is about offense and defense. Of course, network security is not only about offense and defense. Each of them is a general direction, such as data security, content security, traffic security, safe operation, and security compliance.

To sum up, artificial intelligence is like finance, but if you have the resources and connections, I definitely recommend you to go to artificial intelligence. Network security is the Internet in today's environment. As long as you are willing to study hard, at least you will not be too confused Difference.

How to get started and learn network security 【Hacker】

Zero-based entry

For students who have never been exposed to network security, we have prepared a detailed learning and growth roadmap for you. It can be said that it is the most scientific and systematic learning route, and it is no problem for everyone to follow this general direction.

Click to get the high-definition expandable mind map

The first stage: getting started with basic operations and learning basic knowledge

The first step to getting started is to learn some current mainstream security tool courses and supporting books on basic principles. Generally speaking, this process takes about 1 month.

At this stage, you already have a basic understanding of cybersecurity. If you have finished the first step, I believe you have theoretically understood the above is sql injection, what is xss attack, and you have also mastered the basic operations of security tools such as burp, msf, and cs. The most important thing at this time is to start laying the foundation!

The so-called "foundation" is actually a systematic study of basic computer knowledge. If you want to learn network security well, you must first have 5 basic knowledge modules:

1. Operating system

2. Protocol/Network

3. Database

4. Development language

5. Principles of Common Vulnerabilities

What is the use of learning these basics?

The level of knowledge in various fields of computer determines the upper limit of your penetration level.

[1] For example: if you have a high level of programming, you will be better than others in code auditing, and the exploit tools you write will be easier to use than others;

[2] For example: if you have a high level of database knowledge, then when you are conducting SQL injection attacks, you can write more and better SQL injection statements, which can bypass WAF that others cannot bypass;

【3】For example: if your network level is high, then you can understand the network structure of the target more easily than others when you infiltrate the internal network. You can get a network topology to know where you are, and get the configuration of a router. file, you will know what routes they have made;

【4】For another example, if your operating system is good, your privilege will be enhanced, your information collection efficiency will be higher, and you can efficiently filter out the information you want.

The second stage: practical operation

1. Mining SRC

The purpose of digging SRC is mainly to put the skills into practice. The biggest illusion of learning network security is to feel that you know everything, but when it comes to digging holes, you can’t do anything. SRC is a very good opportunity to apply skills.

2. Learn from technical sharing posts (vulnerability mining type)

Watch and learn all the 0day mining posts in the past ten years, and then build an environment to reproduce the loopholes, think and learn the author's digging thinking, and cultivate your own penetrating thinking​​​​

3. Range practice

Build a shooting range by yourself or go to a free shooting range website to practice. If you have the conditions, you can buy it or apply to a reliable training institution. Generally, there are supporting shooting range exercises.

Phase 3: Participate in CTF competitions or HVV operations

Recommended: CTF Competition

CTF has three points:

【1】A chance close to actual combat. Now the network security law is very strict, unlike before, everyone can mess around

[2] Topics keep up with the frontiers of technology, but many books lag behind

【3】If you are a college student, it will be very helpful for finding a job in the future

If you want to play a CTF competition, go directly to the competition questions, if you don’t understand the competition questions, go to the information according to what you don’t understand

Recommended: HVV (network protection)

HVV has four points:

[1] It can also greatly exercise you and improve your own skills. It is best to participate in the HVV action held every year

【2】Be able to meet many bigwigs in the circle and expand your network

【3】The salary of HVV is also very high, so you can earn a lot of money if you participate

[4] Like the CTF competition, if you are a college student, it will also be very helpful for finding a job in the future

I have also compiled some network security information for you below. If you don’t want to find them one by one, you can refer to these information.

Finally, I have compiled a simple learning method for everyone, which can be used for reference:

1. Read more books

Reading is always the most effective way. Although books are not necessarily the best way to get started, the understanding of books requires a certain foundation; but for now, books are a relatively reliable way to get started.

For example: "Hacking and Defense --- Detailed Explanation of Web Security Practical Combat", "Secrets of Web Front-end Hacking Technology", "The Road to Security: Analysis of Web Penetration Technology and Practical Cases (2nd Edition)"

Now there are many books on Web security, so you can avoid a lot of detours in the process of learning. If you have difficulty reading the above recommended books, then find a book on Web security that you can read.

Of course, talk on paper is shallow, so what if you don't practice it.

2. Learning common tools

1. Burpsuite learns Proxy, captures and changes packets, learns Intruder, learns the blasting module, and learns the plug-ins in the practical Bapp app store.

2. Nmap uses Nmap to detect the port opened by the target host. Use Nmap to detect the network service of the target host to determine its service name and version number.

3. SQLMap uses SQLMap to mine the SQL injection vulnerabilities scanned in AWVS for data acquisition practices and exploit common types of vulnerabilities

3. Learning and development

1. Book "Detailed PHP"

2. Practice using PHP to write a script that lists directories, and you can list any directory through parameters. Use PHP to grab the content of a web page and output it. Use PHP to grab the content of a web page and write it to the Mysql database for output.

You can also find an offline training class and study systematically, it is all possible.

This full version of online security learning materials has been uploaded. If you need it, you can scan the QR code of the CSDN official certification below on WeChat or click the link to get it for free [guaranteed 100% free]

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" for free icon-default.png?t=N6B9https://mp.weixin.qq.com/s/rB52cfWsdBq57z1eaftQaQ

Guess you like

Origin blog.csdn.net/msb_114/article/details/132023378