(Hacker) Self-Study Notes

1. Misunderstandings and pitfalls of self-study network security learning

1. Don't try to become a programmer first (learning based on programming) before starting to learn.
In my previous answers, I have repeatedly emphasized not to start learning network security based on programming. Generally speaking, learning programming not only The learning cycle is long, and there is not much critical knowledge available after the actual transition to security

If ordinary people want to learn programming well and start learning network security, it often takes a long time, and it is easy to give up halfway. And learning programming is just a tool, not an end. Our goal is not to become a programmer. It is suggested that in the process of learning network security, what will not be filled, which is more purposeful and less time-consuming

2. Don’t take in-depth learning as the first lesson for getting started.
Many people are aiming to learn network security well and solidly, so it is easy to use too much force and fall into a misunderstanding: that is, to learn all the content in depth. But it's not a good idea to use deep learning as a first lesson in cybersecurity. The reasons are as follows:

[1] The black-box nature of deep learning is more obvious, and it is easy to learn and swallow

【2】Deep learning has high requirements on itself, it is not suitable for self-study, and it is easy to enter a dead end

3. Misunderstandings of self-study in the direction of hacking skills and interests:
Behavior: frantically searching for security tutorials, joining various small circles, downloading every resource, watching every video, as long as it is related to hacking.

Disadvantages: Even after considering the quality of resources, the knowledge points that can be learned are very scattered and highly repetitive.

The code can't be understood, the explanation can't be understood, and the situation of half-knowledge happens from time to time.

After spending a lot of time understanding it, I realized that the content of this video is actually the same as other knowledge points I watched.

4. Don't collect too much information.
There are a lot of learning materials about network security on the Internet, and there are several gigabytes of materials that can be downloaded or viewed at every turn. And many friends have "collection addiction", buying more than a dozen books at once, or collecting dozens of videos

Many online learning materials are extremely repetitive and most of the content has not been updated a few years ago. During the introductory period, it is recommended to choose "small but refined" materials. Below I will recommend some learning resources that I think are good for Xiaobai. Read on patiently.

2. Some preliminary preparations for learning network security

1. Hardware selection

I am often asked "Do I need a computer with a high configuration to learn network security?" The answer is no, the computer used by hackers does not need any high configuration, as long as it is stable. Because some programs used by hackers, low-end CPUs are also It can run very well, and it doesn’t take up much memory. There is another one, the hacker is done under the DOS command, so the computer can be used in the best condition! So, don’t re-purchase the machine in the name of learning...

2. Software selection

Many people will be entangled in learning hackers whether to use Linux, Windows or Mac system. Although Linux looks cool, it is not friendly to newbies. The Windows system can also use the virtual machine to install the target machine for learning

As for the programming language, Python is the most recommended because of its good expansion support. Of course, many websites on the market are developed by PHP, so it is also possible to choose PHP. Other languages ​​include C++, Java...

Many friends will ask if they want to learn all languages? the answer is negative! To quote my sentence above: Learning programming is just a tool, not an end, our goal is not to become a programmer

(An extra thing to mention here is that although learning programming cannot get you started, it can determine how far you can go on the road of network security, so I recommend you to learn some basic programming knowledge by yourself)

3. Language ability

We know that computers were first invented in the West, and many nouns or codes are in English. Even some existing tutorials were originally translated from English, and it usually takes a week for a bug to be translated into Chinese. Vulnerabilities may have been patched at this time difference. And if you don’t understand some professional terms, you will have obstacles when communicating technology or experience with other hackers, so you need a certain amount of English and hacker professional terms (you don’t need to be particularly proficient, but you must be able to understand the basics)

3. Network security learning route

Image too large! If the upload is not clear and needs a high-definition PDF version, you can leave a message to tell me or kick me! Due to the limited number of private messages from strangers every day! You can also follow me. After following, the background will automatically send a sharing link, and you can pick it up yourself!


Phase 1 (Laying the Foundation)
    Cybersecurity Industry and Regulations

    Linux operating system

    Computer Network Basic Course

    HTML Basics Course

    PHP Zero Basic Course

    MySQL Basic Course

    Graphical Python syntax

Phase 2 (Primary Penetration)
    Information Gathering

    web security

    vulnerability scan

    APP penetration

    penetration tool

    Vulnerability recurrence

    Actual digging

Stage 3 (Advanced Penetration)
    Penetration Framework

    privilege escalation

    Authority maintenance

    tunnel technology

    Intranet penetration

    Traceability and evidence collection

    wireless security

    DDOs offense and defense

The fourth stage (safety management)
    level protection

    risk assessment

    Emergency Response

    Data Security

    Interview Employment Guidance

The fifth stage (binary reverse)
    c language

    c++

    Assembly language

    Android reverse

    Windows reverse engineering

    Anti-virus-anti-virus technology

Note: The first three stages are the focus of learning


Fourth, the recommendation of learning materials


    Like, favorite, leave a message in the comment area "Already concerned"! It can be shared with everyone for free! Friends who can't wait can also kick me directly! Or after following me, the background will automatically send it to everyone! After paying attention, please pay attention to the background news!



 All the materials of the video tutorial have been sorted out

 

Book list recommendation:

Computer operating system:

[1] Coding: the language hidden behind computer software and hardware

【2】In-depth understanding of the operating system

【3】In-depth understanding of windows operating system

【4】Linux kernel and implementation

Programming development class:

【1】windows programming

【2】windwos core becomes

【3】Linux programming

【4】Unix environment advanced into

【5】IOS becomes

[6] The first line of code Android

【7】C programming language design

【8】C primer plus

[9] C and pointers

[10] C expert programming

[11] C traps and defects

[12] Assembly language (Wang Shuang)

【13】java core technology

【14】java programming ideas

【15】Python core programming

[16] Linux shell script strategy

[17] Introduction to Algorithms

[18] Compilation principle

[19] Compilation and decompilation technology practice

[20] The way to clean code

[21] Code Encyclopedia

[22] TCP/IP Detailed Explanation

【23】Rootkit: Lurkers in the gray area of ​​the system

【24】Hacking Attack and Defense Technology Collection

【25】Encryption and decryption

【26】C++ Disassembly and Reverse Analysis Technique Revealed

[27] web security testing

【28】White hat talks about web security

【29】Proficient in script hacking

【30】Web front-end hacking technology secret

[31] Programmer's application

【32】English Writing Handbook: Elements of Style


epilogue


The network security industry is like a river and lake, where people of all colors gather. Compared with many decent families with solid foundations in European and American countries (understand encryption, know how to protect, can dig holes, and are good at engineering), our talents are more heretics (many white hats may not be convinced), so in the future Talent training and In terms of construction, it is necessary to adjust the structure and encourage more people to do "positive" "system and construction" that combines "business" and "data" and "automation" in order to quench the thirst for talents and truly serve the society in an all-round way. Internet provides security.
 

Guess you like

Origin blog.csdn.net/jazzz98/article/details/132416439