With a college degree, I switched careers and studied on my own for half a year. I successfully joined Qi An Xin and got a good offer. I would like to share my successful experience with everyone!

After switching careers and self-study for half a year, I finally successfully landed in Qi'anxin. Come and greet me with good luck.
Insert image description here

First let me tell you about my situation. I majored in e-commerce at university. Yes, it is the second-level electronics waiter major in the customer service department that everyone knows.
We classmates often joke about how we wasted everything in our previous lives. In this life, e-commerce merchants work more overtime, have low ceilings, and don’t get much salary every month. Faced with a road with no hope for the future, I decisively chose to change.

After graduation, some classmates went into Java development. They suggested that I try to learn network security. Because I was confused at the time and didn’t know what I wanted to do in the future. I learned about the network security industry online. It feels pretty good. After all, every teenager has had a hacker dream in his heart. It is for this reason that I started to study network security by myself. I studied it for about half a year. Just a month ago, I found the second hacker in Hangzhou. For a network security job, you can get more than 9,000, which is more than that before tax.
In the process of self-study, I have encountered these problems. I don’t know if everyone agrees with them. The free materials are old and outdated and not systematic and coherent. I didn't know how to solve problems when I was studying. The learning atmosphere was poor and it was difficult to persist in studying. Therefore, in order to get a job, I spent a lot of money and spent 8,680 yuan to sign up for a practical cyber security class. This is a screenshot of my payment at that time, for everyone to see.
Insert image description here

Judging from the current results, the money was not wasted. Now that I have successfully landed, it is useless to keep these video tutorials and notes. Instead of leaving them in the network disk and gathering dust, it is better to share them with friends in need. If you are planning to enter the field of network security, stop looking for old information that has been pieced together from many years ago. It is really of little use. I have sorted out all the materials and course notes that I applied for this class. They are all useful information. Now I will share them with you. It is very complete, very systematic, and very practical.

Network security learning resource sharing:

Finally, I would like to share with you a complete set of network security learning materials that I have studied myself. I hope it will be helpful to friends who want to learn network security!

Getting Started with Zero Basics

For students who have never been exposed to network security, we have prepared a detailed learning and growth roadmap for you. It can be said to be the most scientific and systematic learning route. It will be no problem for everyone to follow this general direction.

[Click to receive] CSDN gift package: "Hacker & Network Security Introduction & Advanced Learning Resource Package" free sharing

1. Learning roadmap

Insert image description here

There are a lot of things to learn about attack and defense. I have written down the specific things you need to learn in the road map above. If you can learn them all, you will have no problem taking on private work.

2. Video tutorial

Although there are many learning resources on the Internet, they are basically incomplete. This is a video tutorial on network security that I recorded myself. I have accompanying video explanations for every knowledge point in the roadmap above. [Click to receive the video tutorial]

Insert image description here

I also compiled the technical documents myself, including my experience and technical points in participating in large-scale network security operations, CTF and digging SRC vulnerabilities. There are also more than 200 e-books[Click to receive it Technical Documentation]

Insert image description here

(They are all packaged into one piece and cannot be expanded one by one. There are more than 300 episodes in total)

3. Technical documents and e-books

I also compiled the technical documents myself, including my experience and technical points in participating in large-scale network security operations, CTF and digging SRC vulnerabilities. There are also more than 200 e-books[Click to receive it Books]

Insert image description here

4. Toolkit, interview questions and source code

"If you want to do your job well, you must first sharpen your tools." I have summarized dozens of the most popular hacking tools for everyone. The scope of coverage mainly focuses on information collection, Android hacking tools, automation tools, phishing, etc. Interested students should not miss it.

Insert image description here

Finally, here are the interview questions about network security that I have compiled over the past few years. If you are looking for a job in network security, they will definitely help you a lot.

These questions are often encountered when interviewing Sangfor, Qi Anxin, Tencent or other major companies. If you have good questions or good insights, please share them.

Reference analysis: Sangfor official website, Qi’anxin official website, Freebuf, csdn, etc.

Content features: Clear organization and graphical representation to make it easier to understand.

Summary of content: Including intranet, operating system, protocol, penetration testing, security service, vulnerability, injection, XSS, CSRF, SSRF, file upload, file download, file inclusion, XXE, logical vulnerability, tools, SQLmap, NMAP, BP, MSF…

Insert image description here

Due to limited space, only part of the information is displayed. You need to click the link below to obtain it
CSDN gift package: "Hacker & Network Security Introduction & Advanced Learning Resource Package" Share for free

Guess you like

Origin blog.csdn.net/HUANGXIN9898/article/details/132885362
Recommended