The first stage: mainly talk about the overview of network security, understand the working principle of computers, initially understand the popularization and interpretation of network security industry and network security law, followed by some knowledge of Linux system and windows system, and finally build virtual machines, understand the installation and use of Vmware virtual machines, master the construction of virtual machine security services, and master the configuration and use of various parameters of Vmware virtual machines.
The second stage: the main content of this stage is the database, knowing the basic knowledge of the database, the security configuration of the database, the php foundation and the basic grammar, and realizing the linkage between the database and PHP. Then there are security vulnerabilities such as SQL injection and XSS, and master the industry standards and evaluation methods of WEB security. Script Trojan Horse, database security and configuration, introduction of web middleware, understanding of http protocol, AWVS security tools, Nmap network security utilization, sqlmap tool utilization, Burp Suite security tool utilization, etc.
The third stage: the contents of this stage are XSS cross-site script vulnerability of WEB security, file uploading principle of WEB security, authentication attack of WEB security, explanation of other vulnerabilities of WEB security, and vulnerability analysis of application programs. This stage is mainly the vulnerability analysis of web security.
The fourth stage: the main contents of this stage are network security skills, WAF bypass, use of security tools, advanced use of SQLMap, Kali penetration test course, advanced course of Metasploit, actual combat of Wireshark security analysis, and automatic integration of open source tools.
So what can we do after studying? The initial work is basically the following two aspects.
I. Website maintainer
Because some well-known websites have huge workload and information every day, there are bound to be various problems in the normal operation of websites, such as some data loss or even collapse. At this time, we need a website maintainer, and we can also use the content through network security training.
Two. Network security engineer
In order to prevent hackers from stealing confidential company information and protect users' information, many companies need to establish their own network security work, and network security engineers are the core personnel directly responsible for protecting the company's network security.
Through the above, you can clearly understand the content of network security training and the types of job hunting after training.