Why learn network security:
Network security means that the hardware and software of the network system and the data in the system are protected from damage, modification, or leakage due to accidental or malicious reasons. The system operates continuously, reliably and normally, and network services are not interrupted.
As of August 2018, the number of Internet users in China has reached 802 million, and the Internet is highly developed. At the same time, the openness of the Internet and the risks brought by security breaches are everywhere. Cyber attacks are becoming more and more complex; hacker attacks are more organized; cyber attacks on mobile phone wireless terminals are becoming more serious; news about cyber attacks and data leaks are constantly emerging, and cyber security issues have become the focus of attention of governments, enterprises, and users.
Network information security has become a national strategy
Information security has become a national strategy: leading the direction of China's informatization development
What are the requirements for 70W gap learning network security
There is a serious shortage of network security talents, with a gap of more than 700,000
demand for cyber security talents is huge, and the future will be even bigger.
In 2018, the network security talent gap in China exceeded 700,000. Only 120 of the 3,000 domestic colleges and universities opened related majors, cultivating 10,000 to 20,000 people each year. With 10-20 social organizations, the country’s annual transfer of related talents was about 30,000. , The gap from the 700,000 gap is 95%. In addition, the demand for cyber security talents will increase linearly in 2020, and it is expected to reach 1.4 million, and the demand for talents will soar by 232%...
Cybersecurity salary is high and the threshold is low
Data is collected from the real salaries of thousands of practitioners in the past year. 77% believe that the salaries above are low. In addition, due to the proportion of talent transfer and talent gap in the industry, cyber security has low requirements for practitioners’ experience, and most of them are There is no limit to academic qualifications...
starting salary is high, experience is proportional to salary, the older the higher the worth
More and more industry practitioners will be difficult to make progress when they rise to a certain stage, and it is easy to be replaced by newcomers. However, network security is different from the replaceability of other industries. Network security engineers will be in short supply in the next few decades, and For defending against hacker attacks, except for a very small number of people relying on talent, experience is the first rule to ensure network security...
Network security engineers have wide employment channels and flexible directions
At present, the Internet, communications, new energy, real estate, financial securities, electronic technology and other industries urgently need network security talents. Because of the importance of network security, each industry has a different demand direction at the same time. Practitioners can completely according to their own preferences. Self-employment...
Foundation and preparation
Network security learning to popularize law
Understand and introduce the "Cyber Security Law"
"Decision of the Standing Committee of the National People's Congress on Maintaining Internet Security"
"Regulations of the People's Republic of China on the Security Protection of Computer Information Systems (Revised in 2011)"
"Interim Regulations of the People's Republic of China on the Administration of International Networking of Computer Information Networks"
"Administrative Measures for the Security Protection of International Networking of Computer Information Networks"
"Administrative Measures for Internet Information Services"
"Administrative Measures for the Testing and Sales License of Special Products for Computer Information System Security"
"Measures for the Administration of Communication Network Security Protection"
National Security Act
Other laws and regulations HTTPS://WWW.66LAW.CN/LAWS/415664.ASPX
LINUX basic operation and maintenance
LINUX system operation and maintenance basis
LINUX service management
Docker installation and use
LINUX security hardening
LINUX network management
Network essential foundation
Physical layer
Data link layer and switch
Network model OSI TCP peer-to-peer transmission
Virtual Local Area Network VLAN
Static routing and configuration
Network Address Translation NAT
Access control list ACL
IP protocol and IP address classification
Subnet mask
Gateway
Subnetting
HTML and JAVASCRIPT
Getting started with HTML? Why learn HTML
HTML document format and entity detailed explanation
HTML tags, frames, tables, lists, forms, images, background explanations
Introduction to JAVASCRIPT
JAVASCRIPT features
JAVASCRIPT composition
How to write JavaScript in web pages
Getting started with PHP
PHP environment construction, coding tool selection
PHP basic syntax (functions, variables, constants, comments, data types, flow control, arithmetic operations)
PHP flow control (IF statement, multiple nested SWITCH statement, WHILE loop, FOR loop, GOTO loop)
PHP function
PHP regular expression
PHP file upload, PHP error handling
PHP operation MYSQL database
PHP session management and control
MYSQL/MSSQL
Database introduction, classification, installation, configuration, login, connection, etc.
Basic database operations: create, view, select, check database tables, delete databases and other related command line operations
Data field operations create, modify, add, adjust field order, sort, delete, and other field command line operations
Database table operation creation, view, select delete database table and other related command line operations
Data type integer, floating point, character, time, conformity, etc.
Character set index
Add, delete, modify and check update records, database permissions operations
Cryptography-Through the maze of passwords
Dissecting the basic concepts-what is coding?
What is encryption and decryption
Looking for a silver bullet-is there a password that can't be cracked
Encryption and decryption through JAVA code entry
JAVA code parsing data integrity-message digest MD MAC SHA
JAVA code analysis symmetric cipher-DES AES
JAVA code parsing public key cryptography-RSA EIGAMAL elliptic curve ECC
JAVA code parsing asymmetric key generator
JAVA code parsing key specification management
JAVA code parsing digital signature
Digital certificate related management
JAVA code parsing secure socket
Simple and commonly used BASE64
File Check-Cyclic Redundancy Check CRC
Break export restrictions-use BOUNCY CASTLE to replace the default algorithm implementation
Code Conversion Auxiliary Tool-COMMONS CODEC
is too large to show
**粗体** _斜体_ [链接](http://example.com) `代码` - 列表 > 引用
。你还可以使用@
来通知其他用户。