Why learn network security:

Network security means that the hardware and software of the network system and the data in the system are protected from damage, modification, or leakage due to accidental or malicious reasons. The system operates continuously, reliably and normally, and network services are not interrupted.

As of August 2018, the number of Internet users in China has reached 802 million, and the Internet is highly developed. At the same time, the openness of the Internet and the risks brought by security breaches are everywhere. Cyber attacks are becoming more and more complex; hacker attacks are more organized; cyber attacks on mobile phone wireless terminals are becoming more serious; news about cyber attacks and data leaks are constantly emerging, and cyber security issues have become the focus of attention of governments, enterprises, and users.
在这里插入图片描述
在这里插入图片描述

Network information security has become a national strategy

Information security has become a national strategy: leading the direction of China's informatization development
在这里插入图片描述

What are the requirements for 70W gap learning network security

There is a serious shortage of network security talents, with a gap of more than 700,000

demand for cyber security talents is huge, and the future will be even bigger.

In 2018, the network security talent gap in China exceeded 700,000. Only 120 of the 3,000 domestic colleges and universities opened related majors, cultivating 10,000 to 20,000 people each year. With 10-20 social organizations, the country’s annual transfer of related talents was about 30,000. , The gap from the 700,000 gap is 95%. In addition, the demand for cyber security talents will increase linearly in 2020, and it is expected to reach 1.4 million, and the demand for talents will soar by 232%...

Cybersecurity salary is high and the threshold is low

Data is collected from the real salaries of thousands of practitioners in the past year. 77% believe that the salaries above are low. In addition, due to the proportion of talent transfer and talent gap in the industry, cyber security has low requirements for practitioners’ experience, and most of them are There is no limit to academic qualifications...
在这里插入图片描述
starting salary is high, experience is proportional to salary, the older the higher the worth

More and more industry practitioners will be difficult to make progress when they rise to a certain stage, and it is easy to be replaced by newcomers. However, network security is different from the replaceability of other industries. Network security engineers will be in short supply in the next few decades, and For defending against hacker attacks, except for a very small number of people relying on talent, experience is the first rule to ensure network security...

Network security engineers have wide employment channels and flexible directions

At present, the Internet, communications, new energy, real estate, financial securities, electronic technology and other industries urgently need network security talents. Because of the importance of network security, each industry has a different demand direction at the same time. Practitioners can completely according to their own preferences. Self-employment...
在这里插入图片描述

Foundation and preparation

Network security learning to popularize law

Understand and introduce the "Cyber Security Law"
"Decision of the Standing Committee of the National People's Congress on Maintaining Internet Security"
"Regulations of the People's Republic of China on the Security Protection of Computer Information Systems (Revised in 2011)"
"Interim Regulations of the People's Republic of China on the Administration of International Networking of Computer Information Networks"
"Administrative Measures for the Security Protection of International Networking of Computer Information Networks"
"Administrative Measures for Internet Information Services"
"Administrative Measures for the Testing and Sales License of Special Products for Computer Information System Security"
"Measures for the Administration of Communication Network Security Protection"
National Security Act
Other laws and regulations HTTPS://WWW.66LAW.CN/LAWS/415664.ASPX

在这里插入图片描述

LINUX basic operation and maintenance

LINUX system operation and maintenance basis
LINUX service management
Docker installation and use
LINUX security hardening

在这里插入图片描述

LINUX network management

Network essential foundation
Physical layer
Data link layer and switch
Network model OSI TCP peer-to-peer transmission
Virtual Local Area Network VLAN
Static routing and configuration
Network Address Translation NAT
Access control list ACL
IP protocol and IP address classification
Subnet mask
Gateway
Subnetting

在这里插入图片描述

HTML and JAVASCRIPT

Getting started with HTML? Why learn HTML

HTML document format and entity detailed explanation

HTML tags, frames, tables, lists, forms, images, background explanations

Introduction to JAVASCRIPT

JAVASCRIPT features

JAVASCRIPT composition

How to write JavaScript in web pages

在这里插入图片描述
Getting started with PHP

PHP environment construction, coding tool selection

PHP basic syntax (functions, variables, constants, comments, data types, flow control, arithmetic operations)

PHP flow control (IF statement, multiple nested SWITCH statement, WHILE loop, FOR loop, GOTO loop)

PHP function

PHP regular expression

PHP file upload, PHP error handling

PHP operation MYSQL database

PHP session management and control

在这里插入图片描述

MYSQL/MSSQL

Database introduction, classification, installation, configuration, login, connection, etc.

Basic database operations: create, view, select, check database tables, delete databases and other related command line operations

Data field operations create, modify, add, adjust field order, sort, delete, and other field command line operations

Database table operation creation, view, select delete database table and other related command line operations

Data type integer, floating point, character, time, conformity, etc.

Character set index

Add, delete, modify and check update records, database permissions operations

在这里插入图片描述

Cryptography-Through the maze of passwords

Dissecting the basic concepts-what is coding?

What is encryption and decryption

Looking for a silver bullet-is there a password that can't be cracked

Encryption and decryption through JAVA code entry

JAVA code parsing data integrity-message digest MD MAC SHA

JAVA code analysis symmetric cipher-DES AES

JAVA code parsing public key cryptography-RSA EIGAMAL elliptic curve ECC

JAVA code parsing asymmetric key generator

JAVA code parsing key specification management

JAVA code parsing digital signature

Digital certificate related management

JAVA code parsing secure socket

Simple and commonly used BASE64

File Check-Cyclic Redundancy Check CRC

Break export restrictions-use BOUNCY CASTLE to replace the default algorithm implementation

Code Conversion Auxiliary Tool-COMMONS CODEC

在这里插入图片描述
is too large to show

[Complete outline & learning route map]
在这里插入图片描述
在这里插入图片描述


代码熬夜敲
210 声望354 粉丝

李志宽、前百创作者、渗透测试专家、闷骚男一位、有自己的摇滚乐队