Network Security (Hacker Technology)—Self-Study Manual

1. What is network security?

Network security can be classified based on attack and defense perspectives. The “red team” and “penetration testing” we often hear about study attack techniques, while the “blue team”, “security operations” and “security operations and maintenance” study defense. technology.

2. Cybersecurity market

First, the market demand is high;

Second, it is relatively mature and easy to get started.

3. Required technical level

There are many knowledge points that need to be mastered (for example):

4. National policy environment

The status of countries and enterprises is becoming more and more important. Without network security, there will be no national security.

There are even more righteous hackers who serve the country—Hongke Alliance

This shows the importance attached to it.

5. Network security learning route

Network security (hacking technology) learning road map

If you need high-definition pdf, please leave a message

Phase One: Security Basics

Cybersecurity Industry and Regulations

Linux operating system

computer network

HTML PHP Mysql Python basics to practical mastery

Phase Two: Information Collection

IP information collection

Domain name information collection

Server information collection

Web website information collection

Google hacking

Fofa network security mapping

Phase Three: Web Security

SQL injection vulnerability

XSS

CSRF vulnerability

File upload vulnerability

File contains vulnerability

SSRF vulnerability

XXE vulnerability

Remote code execution vulnerability

Password brute force cracking and defense

Middleware parsing vulnerability

Deserialization vulnerability

Stage 4: Penetration Tools

MSF

Cobalt strike

Burp suite

Nessus   Appscea   AWVS

Goby   XRay

Sqlmap

Nmap

Time

The fifth stage: actual digging of holes

Vulnerability mining skills

Src

Cnvd

Crowd testing project

Recurrence of popular CVE vulnerabilities

Shooting range actual combat

The learning framework has been sorted out, and now we need information resources. I have sorted out the information resource documents corresponding to all knowledge points here.

Friends in need can like, collect and leave a message "Already followed, please share". Just pay attention to the background messages.

1. Video tutorials on all knowledge points

 2.Full tool kit

 3.SRC technical documents

4. Code audit

 5.Reverse engineering

Friends in need can like, collect and leave a message "Already followed, please share". Just pay attention to the background messages.

6. The prospect of network security

There is a huge demand for talents and a large market vacancy. The popularization of Internet of Things applications and the popularization of 5G will increase the demand for network security positions.

In the long run, network security will only become more and more popular, and the rise of intelligent disciplines will inevitably drive the development of new network security technologies.

Three major development directions for network security in the future:

Network security (safety and other guarantees)

Cloud native security

 Application of AI artificial intelligence in network security (ChatGPT)

Big room for development:

Within the company, network engineers are basically in a "double-high" status, that is, high status and high remuneration. It has a wide range of employment opportunities, one specialty and multiple abilities, and practical experience is applicable to various fields.

Great value-added potential:

Mastering the enterprise's core network architecture and security technology has irreplaceable competitive advantages. With the enrichment of one's own experience and the maturity of project operations, the career value has room for appreciation.

Long career life:

The focus of a network engineer's work is on the construction and maintenance of enterprise information, which includes technical and management work. The job is relatively stable. With the continuous growth of project experience and in-depth understanding of the industry background, the job will become more and more popular as he gets older.

7.Finally

I can tell you here with certainty: "Cybersecurity has good development prospects, and cutting-edge network security technology is about to rise, or has already risen."

Guess you like

Origin blog.csdn.net/dexi1113/article/details/135019058