Current location - Education and Training Encyclopedia - Education and training - Network security attack and defense course
Network security attack and defense course
A. Introduction of network attack and defense technology

This book introduces the network attack and defense technology from the simple to the deep. Starting from the different threats to network security, this paper introduces in detail various attack technologies such as information collection, password attack, buffer overflow, malicious code, Web application attack, sniffing, false message, denial of service attack, etc. And some examples are given. This paper systematically introduces the network security defense technology from the aspects of network security, access control mechanism, firewall technology, intrusion detection and honeypot technology, and analyzes the techniques and means of intranet security management. This book can be used as a textbook or teaching reference book for network information security courses in colleges and universities, and also as a practical network security reference book for network information security professionals, network security managers and network users.

B. Are there any students majoring in information security or network security? Want to know if you want to attack and defend the network, on what platform should you build a network attack and defense environment?

A virtual machine is enough. Or you can build a local area network with multiple ordinary computers and routers or switches.

If you use virtual machines, you can download VMware virtual machines on the network, then create multiple virtual machines, install the system for the virtual machines, and set the virtual machine network mode, so that a computer can realize the network attack and defense of multiple virtual machines. Creating a virtual machine consumes a lot of hardware, so it is recommended that this computer be equipped with high-end or above.

For many ordinary computers, it is even simpler. A wireless router can build a local area network.

C. Ask for books on network security/attack and defense.

Enthusiastic help

Hello!

New book recommendation:

1 Network Security Technology and Application (Shanghai Excellent Course Textbook) (2nd Edition) Jia Tiejun, editor-in-chief of Machinery Industry Press, including synchronous experiments.

2 Network Security Technology and Practice (Shanghai Excellent Course Textbook) edited by Jia Tiejun, Higher Education Press, including synchronous experiments and courseware.

Shanghai excellent course "Network Security Technology" has more abundant resource websites:

//jatj . sdju . e . cn/webanq/

D: I'm a software engineering student. Is there any direction related to network security or network attack and defense?

Network security learning content

1. firewall (correct configuration and daily application)

2. System security (server security reinforcement, WEB code security reinforcement, establishment of various application servers, such as WEB MAIL FTP, etc. ).

3. Security audit (intrusion detection. Log tracking)

4. Soft test network engineer, Huawei certification of Cisco CCNA course, etc. (Basic knowledge of network. Troubleshooting and formation of common LAN)

5. Experience accumulation.

1, understand the basic network and networking and the use of related equipment;

2. Server settings and basic network configuration of 2.windwos;

3. Learn basic scripting languages such as js, asp, mssql, php and mysql.

4. Establish more related websites and learn more about website management;

5. Learn about linux, basic applications, system structure, network server configuration, basic shell, etc.

6. Learn the construction of iptables and snort under linux;

7. Begin to learn the attack steps, methods and ideas commonly used by hackers, mainly by looking at the experience of others;

8. Learn all kinds of network security tools applications, scanning, remote control, sniffing, cracking and related auxiliary tools;

9. Learn common system vulnerabilities and script vulnerabilities, and comprehensively apply them according to your previous studies;

1 1, in-depth study of tcp/ip and network protocols;

12, learning data analysis, further deepening;

13, I can calm down and learn the above things, and then I will have the direction of development and learning. These are the basic things, and have not involved the internal structure of the system, network programming, vulnerability research and development, etc. . . Don't be impetuous in your study!

Local area network one-stop communication

"Network security from entry to mastery", and other related materials are searched online by yourself.

The contents of safety training include: safety foundation; System security (Windows &; Linux); Hacker attack and defense, malicious code; Communication security; Common application protocol threats; WEB& script attack technology; Firewall technology (firewall); Intrusion detection system technology (IDS); Encryption &; VPN technology; Product safety; Safety management. You can get to know it.

E. What are the benefits of participating in training courses on information security and network attack and defense?

One is a hobby.

One is more promising in career development.

Do you want to study or not?

F. Ask for some regular and free websites to learn the knowledge of network security attack and defense, thank you!

This is not clear.

G. What are the requirements for learning network security, attack and defense, and program editing?

Education is not important, as long as it is true. . . If you keep studying, you won't learn English well. Self-study is difficult. You need a good study plan. I suggest you find a school to learn. The condition is: strong logical thinking, of course, you can exercise yourself to do more algorithms and practice more. If you speak English, you'd better master grammar well if you have a high level of English. Programming is actually an idea after all. If you have a good programming idea, it will be easy to write about network security. You can be familiar with routing and switching technology, as well as the underlying protocols, master IDS, HIPS and other tools, learn to manage LINUX and 2003 servers, be familiar with disassembly, be able to independently analyze the Trojan mechanism of viruses, master the security mechanism of operating systems, verify and other network security is very huge, and it is not only these that need to be done well, but also involves many technologies and programming skills such as hacking.