Network Security course mainly contain?

  Network security has entered into the phase of sustained hot, and now increasingly high demand for network security, and network security more and more people interested. Some people think, look at the book can master network security courses, in fact not the case, network security is not just learning can be mastered, network security is very complex, you want to find a way to quickly master effective learning, to develop an appropriate route ,Very important. Learn how to network security is more appropriate?

  What are the main school learning network security route description?:

  1, Basics: This contains introductory security, safety laws and regulations, web security and risk, *** environment building, web application technology, the core defense mechanisms, HTML & JS, PHP programming, so that you the basics of network security to do a preliminary To understanding.

  2, and source code auditing ***: *** which mainly contains an overview of testing, information gathering and social skills, *** test tools, protocol ***, web ***, *** systems, middleware ** * network ***, *** write test reports, source code auditing tools, PHP code audit, web security and defense and so on.

  3, grade and security: grading the record, the gap assessment, planning and design, security reform, and other security assessment, vulnerability scanning, policy checking, audit logging, monitoring and analysis, inspection and other industries.

  4. Risk assessment: contains project preparation and launch, asset identification, threat identification, vulnerability identification, asset analysis, threat analysis, vulnerability analysis, a comprehensive risk analysis, planning measure, report output, project acceptance.

  5, ISO / IEC 27001: contains project preparation, information security status of research, asset identification and risk assessment, planning and preparation of system documentation, operation and implementation of the management system, external audits, knowledge transfer, project acceptance.

  6, emergency response: the preparation phase, phase detection, suppression stage, the eradication phase, the recovery phase, summary stage and so on.

Guess you like

Origin blog.51cto.com/14596632/2448391