Current location - Quotes Website - Signature design - How to learn network security knowledge?
How to learn network security knowledge?
You can enter safely from the Web first, and the difficulty is relatively low.

Learning Web security needs to master the related concepts of Web security, penetrate testing tools, penetrate practical operation, be familiar with Windows/Kali Linux, security configuration of middleware and server, script programming learning, source code audit and vulnerability analysis, security system design and development, and so on.

Simply make a study plan:

Step 1: related concepts of network security

Suggested study time: 2 weeks.

The learning content is as follows:

1, familiar with basic concepts (SQL injection, upload, XSS, CSRF, Trojan horse, etc. ).

2. Google uses keywords (SQL injection, upload, XSS, CSRF, Trojan horse, etc. ).

3. It is ok to read Deep Analysis of Web Security as an introductory study.

4. Watch some infiltration notes/videos to understand the whole process of infiltration. Can Google (infiltration notes, infiltration process, intrusion process, etc. ).

Step 2: Be familiar with infiltration related tools.

Suggested study time: 3 weeks.

The learning content is as follows:

1, familiar with the use of AWVS, Sqlmap, Burpsuite, Nessus, China chopper, Nmap, Appscan and other related tools.

2. Understand the purpose and usage scenarios of such tools.

There is no back door to download and install these softwares.

4, study and use, specific teaching materials can be searched online, such as: Burpsuite tutorial, Sqlmap.

5. After you have learned all the commonly used software, you can install sonic startup to make a infiltration toolbox.

Step 3: Infiltrate actual combat operations.

Suggested study time: 5 weeks.

The learning content is as follows:

1, master the whole infiltration stage, and be able to infiltrate small sites independently.

2. Look for infiltration videos on the Internet to think about ideas and principles, keywords (infiltration, SQL injection video, file upload intrusion, database backup, Dedecms vulnerability utilization, etc.).

3. Find your own venue/build a test environment for testing, and remember to hide yourself.

4. Thinking about penetration is mainly divided into several stages, and what work needs to be done in each stage, such as this: PTES penetration test execution standard.

5. Learn the types, principles and manual injection skills of SQL injection.

6. Study the principle of file upload, how to cut it off, vulnerability analysis, etc. Refer to the upload attack framework.

7. Learn the principles and types of XSS formation, and the specific learning method can be Google.

8. To study the method and specific use of Windows/Linux power supply lifting, you can refer to: power supply lifting.

9, you can refer to: open source penetration testing fragile systems.

Step 4: Pay attention to the dynamics of the safety circle.

Suggested study time: 1 week.

The learning content is as follows:

1. Pay attention to the latest vulnerabilities, security incidents and technical articles in the security circle.

2. Browse daily safety technical articles/events.

3. Pay attention to the employees in the security circle through Weibo and WeChat (when they meet Daniel's attention or friends' decisive attention), and take time to brush them every day.

4. Subscribe to safety technology blogs at home and abroad through feedly/ Fresh Fruit (don't confine yourself to China, but pay more attention to accumulation).

5. Develop the habit of actively submitting safety technical articles every day and linking them to the Spring and Autumn Community for accumulation.

6, pay more attention to the latest vulnerability list, you can look at the Spring and Autumn Clouds. Com, practice if you encounter an open loophole.

7. Pay attention to the topics or videos of domestic and international security conferences.

8. Join the technical exchange group and ask the big brothers in the group for some experience and skills.

Step 5: Get familiar with Windows/Kali Linux.

Suggested study time: 3 weeks.

The learning content is as follows:

1. Learn the basic commands and common tools of Windows/Kali Linux.

2. Familiar with common cmd commands under Windows, such as ipconfig, nslookup, tracert, NET, Tasklist, etc.

3. Familiar with common commands under Linux, such as ifconfig, LS, CP, MV, VI, WGET, Service, Sudo, etc.

4. Familiar with the common tools under Kali Linux system, you can refer to Kali Linux's Web penetration test, Kali hackers, etc.

5. To be familiar with metasploit tools, please refer to the Metasploit Penetration Test Guide.

Step 6: Security configuration of middleware and server.

Suggested study time: 3 weeks.

The learning content is as follows:

1, learn the server environment configuration, and discover the security problems in the configuration through thinking.

2. IIS configuration under Windows Server 2012 environment, paying special attention to configuration security and operation authority.

3. The security configuration of LAMP in 3.Linux environment mainly considers running permission, cross-directory, folder permission and so on.

4. Remote security reinforcement, restricting user name and password login, and restricting ports through iptables; Configure software Waf to strengthen system security, and configure systems such as mod_security on the server.

5. Check the security of the configuration environment through Nessus software and find unknown security threats.

Step 7: Script Programming Learning

Suggested study time: 4 weeks.

The learning content is as follows:

1. Choose one of the scripting languages: Perl/Python/PHP/Go/Java, and learn programming from common libraries.

2. Build a development environment and choose IDE. Wamp and XAMPP are recommended in PHP environment, and Sublime is strongly recommended by IDE.

3, Python programming learning, learning content includes: grammar, regularization, files, networks, multithreading and other common libraries, Python core programming is recommended.

4. Write the exp of the vulnerability in Python, and then write a simple web crawler.

5. Learn the basic grammar of PHP and write a simple blog system. See PHP and MySQL Programming (4th Edition) and video.

6. Be familiar with MVC architecture and try to learn a PHP framework or Python framework (optional).

7. Understand the layout of Bootstrap or CSS.

Step 8: Source Code Audit and Vulnerability Analysis

Suggested study time: 3 weeks.

The learning content is as follows:

1, can independently analyze the script source program and find security problems.

2, familiar with the dynamic and static methods of source code audit, know how to analyze the program.

3. Understand the causes of Web vulnerabilities, and then search and analyze them through keywords.

4. Study the formation principle of Web vulnerabilities and how to avoid such vulnerabilities from the source code level, and organize them into a checklist.

Learning address: official website (Qi 'antang) in my Spring and Autumn Period.

Step 9: Design and development of security system

Suggested study time: 5 weeks.

The learning content is as follows:

1, can establish its own security system, and can put forward some security suggestions or system architecture.

2, develop some practical security gadgets and open source, reflecting personal strength.

3. Establish your own safety system and have your own understanding and views on company safety.

4. Propose or participate in the architecture or development of large-scale security systems.