2024 Network Security (Hacker) Self-Study Plan

1. What is network security?

Network security can be classified based on attack and defense perspectives. The “red team” and “penetration testing” we often hear about study attack techniques, while the “blue team”, “security operations” and “security operations and maintenance” study defense. technology.

2. Cybersecurity market

    ​ 1. The market demand is high;

    Second, it is relatively mature and easier to get started.

3. Required technical level

There are many knowledge points that need to be mastered (for example):

4. National policy environment

The status of countries and enterprises is becoming more and more important. Without network security, there will be no national security.

There are even more righteous hackers who serve the country—Hongke Alliance

This shows the importance attached to it.

5. Network security learning route

Network security (hacking technology) learning road map


If you need high-definition pdf, please leave a message

Phase One: Security Basics

    Network security industry and regulations

    Linux operating system

    computer network

    HTML PHP Mysql Python basics to practical mastery

Phase Two: Information Collection

    IP information collection

    Domain name information collection

    Server information collection

    Web website information collection

    Google hacking

    Fofa network security mapping

Phase Three: Web Security

    SQL injection vulnerability

    XSS

    CSRF vulnerability

    File upload vulnerability

    The file contains vulnerabilities

    SSRF vulnerability

    XXE vulnerability

    Remote code execution vulnerability

    Password brute force cracking and defense

    Middleware parsing vulnerability

    Deserialization vulnerability

Stage 4: Penetration Tools

    MSF

    Cobalt strike

    Burp suite

    Nessus   Appscea   AWVS

    Goby   XRay

    Sqlmap

    Nmap

    Time

The fifth stage: actual digging of holes

    Vulnerability mining skills

    Src

    Cnvd

    Public testing project

    Recurrence of popular CVE vulnerabilities

    Actual shooting range

The learning framework has been sorted out, and now we need information resources. I have sorted out the information resource documents corresponding to all knowledge points here.

    Friends who need it can like, collect, follow and leave a message "Already followed, please share". Just pay attention to the background message.

1. Video tutorials on all knowledge points

 2.Full tool kit

 3.SRC technical documents

4. Code audit

 5.Reverse engineering

    Friends who need it can like, collect, follow and leave a message "Already followed, please share". Just pay attention to the background message.

6. The prospect of network security

There is a huge demand for talents and a large market vacancy. The popularization of Internet of Things applications and the popularization of 5G will increase the demand for network security positions.

In the long run, network security will only become more and more popular, and the rise of intelligent disciplines will inevitably drive the development of new network security technologies.

Three major development directions for network security in the future:

    Network security (security and other guarantees)

    Cloud native security

     Application of AI artificial intelligence in network security (ChatGPT)

Big room for development:

Within the company, network engineers are basically in a "double-high" status, that is, high status and high remuneration. It has a wide range of employment opportunities, one specialty and multiple abilities, and practical experience is applicable to various fields.

Great value-added potential:

Mastering the enterprise's core network architecture and security technology has irreplaceable competitive advantages. With the enrichment of one's own experience and the maturity of project operations, the career value has room for appreciation.

Long career life:

The focus of a network engineer's work is on the construction and maintenance of enterprise information, which includes technical and management work. The job is relatively stable. With the continuous growth of project experience and in-depth understanding of the industry background, the job will become more and more popular as he gets older.

7.Finally

I can tell you here with certainty: "Cybersecurity has good development prospects, and cutting-edge network security technology is about to rise, or has already risen."

Guess you like

Origin blog.csdn.net/stopluox/article/details/134894881