How does network security start from zero?

 Now that you have known about the Salary of Network Security Engineer, you must be attracted to achieving it. If you wish to have it, you must have to do lots and lots of studies, unless you have a good and reliable CCNP 300 610 DCID Dumps provider like that of the EveDumps.

  • 2018-04-02 Celebrating "hacker said" pay attention to breakthrough 5000, add some content </ li>
  • 2018-02-25 Modifying article error, add 1 typical problem </ LI > 2018-01-10 Modify the article format, add 2 typical problems </ li>
  • 2017-11-15 Selection Recommended answer </ li>
  • 2017-03-20 Original version </ li> </ UL> directory:

     

  • origin - Why writing this article </ li>
  • Heart method - Surgery game </ li>
  • Preparation - Question to consider </ li>
  • experience - learning route details </ li>
  • end - Reference Bookmination </ li> < Li> Iterative - Typical Problem Solutions </ li> </ ol> 1. Start - Why writing this article from 2003 Since the beginning of the hacker technology, the front before and afterwards has been answering about how to learn hacker technology, and they have also been moved by some initiators vows. It has been a teacher who has been teaching to the beginning of the vows. Sorry to contact me (some or even pulled me black -_-!). To be honest, I have been now, I think most of the readers of this article will finally finally give up. The reason is very simple, and self-study is a learning method suitable for very few people, and very slow, in this The variables in the process are too large, and it is slightly inadvertent, and will be against the original ideals. However, after all, there is a young man like I have, they have perseverance, ideal, they really can insist on learning this technology for ten years, and if someone is slightly guided, it is likely to take his self-study time. Reduce double, even more. Therefore, in this case, there is a long text, this article has been refining my own self-study history, and ICRAT I have integrated the number of three years I have spent the 15PB. Hundreds of excellent information security engineers experience, because I am already in "How hacks learn? - Answer - know "I have answered the specific implementation problem, so I mainly talk about the inner things. In fact, I have seen the experience in so many years, and more people have not learned, in fact, it is more than the inner thing. Striped, I hope this article can help the readers who want to learn from the help. 2. Mind - Surgery and Tao game The experience of the year, the end my experience is - Decide whether most people can learn the key points of this technology, whether they are accurate for some basic issues. Use a human saying that the ability to guide the inner impulse and target (technique) with wisdom (Tao) in the world, determine the final ending of your study (even bigger, this life ending). Below I explain this problem from three typical cognitive fallaies: First, it is the game of endpoints and growth. I have asked many beginners who study hacking technology to learn this, the maximum answer I got is " I have to be very cattle </ u>!", but as How to make a cow, their answer is " If I learn hacking technology, I will" ", when you continue to ask what you want to learn, you will basically ask. . Of course, the purpose of my article is to solve this problem, but the author's current experience is different from eight years ago, I draw "Windows Hacker Learning Development Flow Chart V0.2 Beta". I feel that I have an obligation, and I have the ability to give you a better place for beginners. Therefore, I have a nonsense with this life, but I personally say this. It is the essence of my experience. I believe that the vast majority of the students who read this article are heard in high school, that is, " as long as how to learn, you can take a good university, it will succeed </ u> "This one of this one is from the evolution of millions of years of human beings, but with the development of thousands of years, this idea has gradually become our 桎梏. Sadly, as a new human, we have to endure such an error value of high school education. The final result is to accept more education we have weakened his value. Dear students who have experienced the college entrance examination should feel touched:
    • When you are in high school, you are told that you must take a university to success </ li> < Li> When you think that you have been successful in the first-child journey, you are told that you must have a credit to get a diploma to successfully successfully. </ li>
    • and when you succeed, you must find it. A good job can succeed </ li>
    • and when you have finally found a good job, you are told that you must have a good completion of KPI fast promotion and salary. > When you make the strength of the breast, you are told that you must buy millions of houses in Beijing to success </ li>
    • ... </ li> </ ul>
      And if you have been in this thinking life / learn, then you will basically don't succeed, your achievement of every goal will make you more complaints, less than a might, and finally most people are limited This dead cycle is swallowed. And more destitory is that because you are too concerned about the local part of "success", you can't think of a problem with a greater pattern. If you can't break the gene brings you, then you will always be a livelies, and we all know that it is impossible to have a hacker's elite. Therefore, before you officially prepare to learn hackers, it is recommended that you have to understand an objective fact, that is, it is - Only growth is an eternal theme, the success of the process is just a milestone on your growth road. . is that you have to figure out a matter, the so-called success is just a small goal for your obscenity, but not the end, if you know this, then you will appear Very serious problem. <RTIgt; Readers who don't have this idea, please click on the upper right corner, go out to turn around the big hacker website), Xiao Ming first needs to do it is to be proficient in the C language. Obtaining C language and the tool flow of theft QQ, I don't know how many times I want to be advanced. Therefore, it will be more difficult, so it will lead to Xiaoming to do a high actual value, but in Xiaoming seems to be not worth mentioning (C language is far from stolen QQ advanced in Xiaoming), which will eventually brought the cognitive disorder that will lead you the passion of hacking technology. Therefore, the first iron to learn hacker technology is Don't have end point thinking, and it is deeply understood that the growth is the eternal topic . Second, it is the game of fantasy and value. Lazy is the easiest to easily make people gain fantasy. Because it is lazy, it can't get it, but the inner heart is incapacitated, so I can only pass fantasy to paralyze themselves. The fantasies here may be their own conscious fantasies, or there is no uninterested fantasy, and even they don't know that they are in the fantasy (for example, those who participate in pyramidalers or most direct sales of micro business practitioners). However, you must not have to blame it for this, at least for me, or the conclusions I got by observing the people around, including almost everyone, almost everyone is in a bad. Striving with lazy, for example, "Too many things", "This is too difficult", "no inspiration", etc. is a illusion that is caused by lazy. Therefore, any big cow in your eyes is not adopted with countless times and laziness. Therefore, you have to know that only you really leaver your body will go to a little bit of learning knowledge, you will make you getting closer and closer to hackers. But the terrible thing is that most beginners don't know these. They always think that there is a kind of spiritan medicine that can make him master the hacker technology in a shorter time, thus spending several times more than the so-called "more Short time "seeks this way that does not exist. It is not exaggerated, this article itself is part of the fantasy, in fact, this is the sugar-coated shell that I have given you, wrapped with the fantasy coat, expect to save this Including the 芸 内. Therefore, the second iron to learn hacker technology is Don't have any fantasies, any stealing, as long as you decide that this road is going to go, then, no matter how you look for odd skills Never let you take half a step less. Finally, it is an impetuous and patience game. It is self-satisfied, and the high hands are from impetuous, and the most deadly is that the overall society is impetuous. A few minutes of short video, the 2x speed TV drama is popular and the blog is the hot and microblogging, which the so-called fast rhythm life of these phenomena will be blocked, and it is I don't want to go deep, and the kernel of Xiao Zhu is. We think that a few minutes of short video can master some knowledge. We think that 140 words Weibo can describe all things, we think that reading the article will look at the essence, and spend 30 minutes in the current rhythm of 30 minutes to read one by word. Democratic Wen is a stupid behavior (for example, now you), and this idea is the most typical impetuous. From the beginning of the toddler, we have learned that the road must be step by step by countless fell. If you are in a hurry, you will be tripped; Crying and knowing that if you want a word, you will be misunderstood; Out of place. The process of our growth is to continue to abandon impetuous, picking up patient journey. If you understand the meaning of growth, if you have firm confidence, you may be stumbled by the last stone, that is, Patience for yourself. The vast majority of people I have, which will overestimate their energy, overestimate their efficiency, overestimate their IQ, even overestimation of their own interested. This series of highlights will seriously interfere with our learning effects in the second half of the study. The gap between the reality and the ideal will lead you to the cognitive disorders of your ability, and it is too low to estimate the capabilities of themselves. It eventually leads to failure. Therefore, the third iron to learn hacker technology is to have a low-efficiency patient's patient . 3. Preparation - The problem to consider Before you want to do anything, you must want to clear the three problems, you are why you want, What are you willing to pay for this, what is the result you want? The so-called wisdom is that a person constantly adjusts its expectations for various things through this way, thereby achieving a balance between the outside world. If this idea is mapped to hacker learning this, it can be divided into the following three issues. First, consider clear what you want to learn this . To put it bluntly, what is your motivation, if your motivation is unsustainable, such as the aft QQ (even digging a system-level 0day vulnerability), then I suggest you modify your motivation to sustainable, for example you want Keep one record (even make others more respectful), because this type of motivation is constantly changing, only this type of motive can make you have a longer momentous source, in order to urge you to insist for longer, too It can achieve greater achievements. Second, consider understand what you can pay . You have to be clear, anything is cost, and if you have the age at this time, you then your understanding of the "price" is more and more serious, this must pay attention to it. Havel technology is a very charm, very valuable, and it is also a very cool thing, but such a charming thing, if you want to complete it, you need an excellent luck, or need You pay for non-human efforts. <RTIgt; </ RTI> " But the truth of the fact is that they are actually running a code that is ready, and the time in the media said in these seconds is actually the runtime of the code. As far as I said, they need to experience at least more than ten or dozens of sleepless nights before they participate in the competition, and then they can create artworks that may have only hundreds of bytes. The code (that is, Exploit), and finally I can take the scene to go through the five cliffs. If the most of the big mulberry hackers in this $ 13 billion people need this, then as the current silent, what do you need to learn how many sleepless nights? Finally, consider what is your learning direction . There are too many directions in the field of information security. If the most crude score can be roughly divided into network security, software security, and basic security. The network security includes network penetration, communication security, telecom security, etc., software security includes authorization control, vulnerability mining, encryption and decryption, etc., basic security is divided into theoretical security, cryptography. I have received the most, but also the most depressed problem is " teacher, your picture I have seen, but I want to know what I should learn? Or Start? </ U>? "Yes, you didn't see the wrong, even how this picture has got an imagination, but there is still a big part of people don't seem to be because of this world. What did they get, they are still confused, of course, this is not a solid. All people's growth is from knowing what they don't need, for example, almost more than 95% of college students don't know what they want, I only know what I don't want, this is actually A manifestation of immature, using our dialect is "olucopatist". "What is the most needed? It is the guidance of the predecessors, telling them that their real needs are, then they suddenly realize, it seems that this is really what they need now. <BRAPROUNCTIONS, it is not so complicated, it will pick up a direction you most interested in interest; if you can't pick it up, then you will pick you yourself. If you pick it up Can't come out, then pick a one you feel the most pleasant. Like other things, learning information security technology is the same, and eventually, if you want to make achievements, it is inevitable to be a strong in this area, but you can't do this at first, so the simplest The method is to pick it up to pick it up of a mountain peak. Because as long as you can board a mountain, you will be a small mountain. The same is true of learning information security technology, you should want to find a direction that is not too shallow (such as penetration, some shallow shallow), etc. . 4. Experience - Learning route Detailed explanation I have been in "How hacking how to learn? - Answer - know "Answer, copy the picture here, save trouble.

      5. End - Reference Bookmarks

      All books total 2632.50 yuan, about 15,000 pages . These contents are at least 3 years if they are decentralized. If the work is self-study, if the work content cannot be relieved with the learning content, then at least it takes at least for more than 5 years. Amway : If you want to learn more than 70% of the content above within 6 months, you can consider the 15th school (15PB?), with fifteen (15PB?), At least you can save you more than two years, it is equivalent to spending the equipment in the game, which has become the RMB player in the "hacker game world"! 6. Iterative - Typical Problem Solution If you have any questions, please ask questions in your message, I will bring some typical problems to here.


      A: I want to learn hacker technology / information security technology, how should I learn? q : I can answer all in this article. If the article is unable to include what you are interested in, you can easily have targeted. The presentation, so that I can be targeted, otherwise I am really difficult to answer like this. A: If I want to learn this technology, what kind of English and mathematical skills do you need? q : This mainly looks at your position, no exaggeration, any science post, if your English and mathematics are very good, relatively else Competitiveness (more powerful strength to achieve the same high levels), more potential (more likely to get scarce resources and opportunities in career). However, on the current, the division of labor in the computer field will become more and more fine, and the mathematical people can specialize in designing algorithms, and the technical good people can do implementation, so if you give your own positioning is not a top information security company The technical core of the medium, generally can't get the degree of menstruation, and the degree of English. In terms of overall, the impact of English and mathematical stacks to a person's technology is definitely less than 20% (in fact, for most people, less than 5%). A: What is the importance of education in the information security industry? q : Because the entire industry is more scarce, the technical person is basically the strangeness of interest self-study, so this part of the people's academic qualifications Universal is not high, so various companies are also in the case of recruiting, and they have expressed that they can be academically qualifications. At present, although there are still some companies claim that they are not card academic, whether they are in the entry request, the employment salary is still the position, the low degree can be said that it is already disadvantageous. The reason for this problem can be said to be many aspects, and if you can see the importance of my answer in the information security industry? : What is the importance of education in the information security industry? What is the importance of education in the information security industry? Edited from 2018-04-02 Hacker Information Security learning method 943 153 reviews sharing The collection 943 sharing is included in the following column ("hacker) Said that the safety circle old bird is a piece of self-relying on the small white, there is no obstetrical professional term, there is no big piece of pure technical theory, and there is only a story and thirsty hacking technology. If you are a student who is interested in hackers, if you are an IT industry who wants to care for this industry, if you are a staff in other fields, because some reason needs to expand your own hackers. Literacy, then, "hacker says" Welcome! It has been concerned

      recommended reading

      want to be a hacker? Let's take a list of this information security resource. It will break Kali's well-class, and the early curse of prison is the best defense. This sentence is equally applicable to the world of information security. Here, there are 16 legitimate websites to practice hacker technology, whether you are a developer ... (a tree

      offense is the best defense! 19 online websites practicing hacking techniques: Ali gathering safely published in Ali Games ...

      How to become a hacking long published in Aurora Daily

      153 comments Switching to time sorting to write your comments ... < / P>

      Zijian 8 months ago, the 7th time I saw this blog post, and I still want to say something. First, pay tribute to the blogger, because I know how scarner is how scarner is how scarner is to find useful articles or routes in China. I am a programmer, and I have only more than a year. The work of work in JavaWeb is not only half a year ago, as a Java practitioner, Java technical articles, Video teaching can be said to be all, so don't feel about this idea when you study the idea of ??learning safety technology, now I have a deep understanding of more than half a year, it will be used. Compilation, also wrote a simple shellcode, but even the reference book is not as good, not only the amount of code is serious, but even the functional implementation is problematic, the compressed code has not been introduced so far, it is too difficult, one degree Abandoning, once the blow, plus the pressure of work, only occasionally open the book, plan your dream, no one guidance, there is no clear route, everything can only touch the stone, I have dreams, I have become a dream. The real "hacker", unlike many people want to theft QQ, accounting for small and cheap, I think I personally be a very unsound, as a socior person, is a thing that can't make it in reality, and The network gives too much convenience and temptation, I also understand that this idea is very dangerous. I don't want to be obscure, the same, I don't want to be a script kid, I always think that I can find a vulnerability, write shellcode, give the solution's talent worthwhile I have learned the foundation, but I don't understand the time of reference books and the current changing system environment. I really can make me use what I have learned in a day. The big cattle always said that the foundation is the most Important, I also understand this truth, but I can't practice, I can only try to simulate the environment, find a long time, the loopholes, this means, this kind of meaningless paper talks, I can bring me practical How much I believe this is not a confusion of me alone, 31 reply to the report

      (author) Reply to the purple sword 8 months ago you want The more knowledge of the knowledge, the more the time your learning information is safe, then you need to do what you said "meaningless paper talk" practice time needs to be, the longer you need to learn. The old knowledge needs more. The game of information security is essentially the game of people and people. For a segment of the offensive technical fragment is like a game, only each of the history of each section can weaken your own peerless Chess, and recorded the history. However, in fact, the "meaningless paper talk" if you refer to software vulnerabilities, then you should be glad, because even the simplest vulnerability utilization, in many beginners The eyes are still a glorious. 17 View Dialogue Reply Stealing Report

      knows 1 month ago, A1 Great God, you pay attention to you and 15PB (15th) very long Time, you have always been the object I worshiped, I have always wanted to train, but there are a few doubts in my heart, I have been smothering me, so that I can't decide, I am hesitant, I hope I can get the guidance of A1 Great God. I am scientifically art, but I have been full of towing in the security industry. After graduation, due to poor technical foundation, it has not been able to enter the security industry, and it has been engaged in software development Java Web and mobile directions for 4 years. I found that I am increasingly annoying, this is not technical, constantly Write the business code boring work, more and more let me firmly transfer to the underlying safety, so during the work, self-study, data structure, operating system principle, C / C ++, etc., learn very zero, no system, so consider separation Training. However, there is always a rock in my heart, that is, I am learning art. The undergraduate effect has not learned the high number, discrete, cryptography, algorithm, English (this can self-study, ignore), etc., I saw it. Related to mathematics, such as: an algorithm introduction, compilation principle, cryptography, related to mathematics, it is straightforward, so it is a bit afraid of seeing a high correlation. However, self-study mathematics, it takes a long time and a lot of exercises. It is not the short-term ability to make up for it. Therefore, after I am too afraid of me to transfer to the security industry, mathematics will become my career development ceiling, and then go back, that price Too big, it is not allowed. Therefore, I want to ask the A1 Great God. Is the mathematical basis impact on the security industry? Will it be a ceiling of career development? Can the mathematical basis agree to make up for self-study? Or have any other way to solve this problem? Also found for many years, my logic thinking is not very strong, and it is very normal. Is there any way to improve? The bigger the age, the greater the cost of the transfer, the more problems, I am worried, I am worried After the resignation training, after work, I found mathematics to limit my technology development. I didn't enter the way in front of it. I didn't take a way back, I was embarrassed. . It is desirable to obtain a pointer to the point of the gods, and the "first" first, first, first, first, as long as it is a computer, Regardless of any direction, if the research is in depth, it is inevitable to meet some mathematical problems, but individuals believe that as long as it is not a very high area, math is mathematics in most fields of the computer. This can be relatively easy to say. Second, with the growing development of the computer to the artificial intelligence, the relationship between various fields and mathematics in the computer is also relatively close, but we should also see that with the various fields of the computer. Gradually improved, the future development trend of computer must gradually tend to divide the division, that is, if you are fine in mathematics, then you can specialize in research algorithms. If you are more popular, you can specialize in research process engine. . Finally, for information security / network security, most important mathematics, this is really hard to say, but we can ratio. I think the role of mathematics is similar to English. If you are not good in mathematics or English, you don't have a slowness of your new technology to a certain extent, but this doesn't have an essential impact on your technology development, if you want If you give an right value, I think mathematics and English should be less than 20% for your research information security. If you have developed 20% level, you have been very powerful, you will never have you. There is no way before, there is no way to retreat. Other, with respect to the transfer, I think you should set another trigger point for yourself, because any job, there is a monotonic, bored, repetitive process, in fact, constant innovation is also A more boring thing. People are acting in practice, and the most favorable practice is actually working. The weekend travel is not all of life, that is just a part of the entertainment in life, accounting is not big, and it is the biggest in life. It is our work, working, work is worth it, work mentality, every day will be happier, happy. However, if you think about mature, please join the fifteenth place! 13 Viewing dialog replicates stepped to premise the selected comment

      Yang Lei 1 year ago front sofa 4 Reply to the report

      Ning Reply Yang Lei 1 year ago, you will run the fast 2 View dialogue Reply to the report

      The oil bar hawker has no courses on the official website for 1 year ago. . 8 Reply to the report

      okokokyour 1 year ago, so those who self-study, the teenage hacker is more metamorphosis ... 44 replies to the report

      clearly responds Okokokyour1 years ago, the metamorphosis is simple. BR /> I feel that some books have been repeated! 1 reply to the

      (author) Reply Lin Zhijun 1 year ago, learning a skill can never look at a book, and all books recommended are from different The angle has its own uniqueness, it is essential. Viewing the dialogue reply to the report

      (author) Reply OkokokYour1 years ago (under 16 years old) is often the front-end direction, so far I haven't found a hacker who has a little achievement. The front-end direction is often the use of the tool (360 speculation, a teenage hacker, actually PHP has not been completely used, and if self-study in the bottom direction, these books seem to see the novel, at least More than 1 year. Unless it is true, it is impossible to master so many knowledge at the age of 15 (probably a high one, third day). 34 Viewing a dialog reply to the report

      shadow 1 year ago has received 2 reply to the report

      Betamao finally thought of it, you are the author of "hacker swearing attack and defense", which has learned a lot in that book, but it feels a bit unreliable for 6 months. . . 12 Reply to the report

      The fireworks are greatly praised 1 year ago. The author talks about hacker learning, and it is also helpful to me in other aspects. Thanks 5 reply to the report

      Millennium Xiaomu 1 year ago In your learning flow chart, the proportion of algorithms is very small. Is it not very important in the study of the algorithm at this stage. So I have a problem to ask: 1 In the future study, the algorithm is still not important (I am not good). 2: Look at your recommended books, most of them are C ++, but I listen to others say this course is a course of time, is it really enough for 6 months, what is it best? The foundation is better, thank you 6 reply to the report

      (Author) Reply Betamao1 years ago, it is not important, the important thing is how the reality ^ _ ^ 5 View Dialogue Reply Stealing Report

      (Author) Reply to Millennium Small Mu 1 Years About You Question 1 Answer. Algorithm It is indispensable only in a very common situation (these scenes are biased). This is a picture that guides beginners to quickly form active capabilities, so the ratio of algorithm is relatively low; Answer. CPP does eat time, but there are many ways to make more than 70% of students master in 3 weeks. Of course, if you are self-study, then learn similar knowledge with "pragmatic" strategy, otherwise fall into C ++ pit, it is possible to come to 1 ~ 2 years; "problem 3 answer Although 6 months will not be repaired for free, but it is indeed a lot of zero-foundation to come to 100PB, and there is no re-repair. However, this is a network, I can't pass the text prove, 15pb has graduated hundreds of students, all over the domestic information security company. Finally, the foundation is better: <br/2 If you are a zero basis (for example, writing Hello World), then you re-repaire the possibility, the whole Learning time should be between 8 and 10 months, and finally learn to learn more than 60% of the 15PB courses (find safe work without pressure), if you have a certain computer language, then you probably have 90 % Of the probability of a one-time, and finally learn about 70% of the 15PB courses. If you have a certain security basis (for example, it will be simply reversed), then you should learn our 15PB lesson 90 %% of knowledge 9 View dialogue reply to report

      Lowrebswrd1 years ago, not just learning security, others are like this, very inspirated. 3 reply to the report

      Millennium small animal husbandry Reply (Author) 1 year ago Thanks A guidance, in August this year, go to study vulnerability excavation. Please also ask A major advice. Especially social workers |.

      If you wish to make your career in network, the Certifications is considered to be the best certification, to jump-start your career. But gaining this certification isn’t considered to be that much easy. You have to go through lots and lots of study process unless you have the help of the CCNP 300 630 DCACIA Dumps offered at the EveDumps.

评论

热门博文