If you want to learn cybersecurity and hardware knowledge on your own from the basics, please point

Updated on educate 2024-02-23
14 answers
  1. Anonymous users2024-02-06

    Go to the Internet (e-book bar), and there are many tutorials.

  2. Anonymous users2024-02-05

    The first step, of course, is computer basics.

    Unlike back-end development such as programming, which has a very clear learning path, cybersecurity may seem complex, and there are many things to learn, which is difficult to learn.

    How to learn network security well, and what should network security learn?

    It's actually quite simple.

    Let's first make it clear that network security is classified into three sections according to the technical direction: security research and development, binary direction, and network penetration direction.

    The Internet industry has its own related research and development, which should be very clear to everyone, and the network security industry is even more so, network security research and development also has front-end, back-end, big data analysis, etc., of course, these positions are not particularly closely related to the security business relationship, but the companion refers to still belong to network security-related.

    Particularly closely related to the security business is the development of (prevention) security products and (attack) security tools.

  3. Anonymous users2024-02-04

    Self-study to understand the basic network and networking and the use of related equipment;

    2. WindWOS server settings and basic network configuration;

    3. Learn basic HTML, JS, ASP, MSSQL, PHP, MYSQL and other scripting languages.

    4. More erection related to **, more learning ** management;

    5. Learn Linux, understand basic applications, system structure, network server configuration, basic shell, etc.;

  4. Anonymous users2024-02-03

    Students with no prior knowledge should not try to start learning based on programming.

    Generally speaking, it takes a lot of time to learn programming, and there are not many key knowledge points that can be applied to learn programming and then transition to the knowledge of network security. In addition, it takes a long time to learn from programming, and it is easy to give up halfway, and it is easier to lose one's interest in cyber security courses.

    Don't take in-depth learning as the first step in cyber security courses.

    Many students learn a course on their own because of their interest, and they also like in-depth study and research in their studies, and this learning spirit is right. However, the first step of learning in cybersecurity courses is not suitable for deep learning, one of which is that the black box nature of deep learning is more obvious, and it is easy to swallow dates.

    Second, deep learning has high requirements for itself, is not suitable for self-learning, and it is easy to walk into a dead end.

    Don't collect too much information.

    There are a lot of learning materials about cyber security on the Internet, and many students have a "collecting habit" and may collect dozens of G at once, and will spend money to buy some books back. To be honest, it's really not necessary, some of the data is very repetitive, and some of the data may be from years ago. During the first contact with network security knowledge points, it is recommended to choose materials "small but fine".

    The latest cyber security course recently sorted out by the Snail Academy has been launched on Station B! Our course covers a comprehensive set of knowledge points, and we hope to help more partners who are interested in network security to get started.

  5. Anonymous users2024-02-02

    Cybersecurity can also be self-taught. You buy the textbook first, and then you learn by reading the book.

  6. Anonymous users2024-02-01

    As long as it is written by a person, there is a vulnerability, there is no system that does not have a vulnerability, only a system that does not find a vulnerability. This industry is currently in a very good situation, and it can be regarded as a sunrise industry. I think this is a good thing for both learners and practitioners in the cybersecurity industry, which has been neglected for many years and can now be regarded as the stage of prosperity.

    The talent gap in this field is very large now, and it will be even bigger in the future. Therefore, if there are young people who are interested in this field, lay a solid technical foundation, and consciously improve their academic qualifications, this field will be a world of high-quality and highly educated talents in the future, and it will be dominated by science and technology, and the core technology will be supreme.

  7. Anonymous users2024-01-31

    Cyber security must be able to learn on your own, and you can learn a lot of things and knowledge on the Internet.

  8. Anonymous users2024-01-30

    Cyber security can certainly be done on your own.

  9. Anonymous users2024-01-29

    Cyber security, if you want to learn on your own, you should be able to do it, and there are a lot of online textbooks now.

  10. Anonymous users2024-01-28

    Some typical cybersecurity.

    Questions, you can sort them out:

    IP security: The main attack methods include passive network eavesdropping, active IP spoofing (packet forgery and tampering), and routing attack (man-in-the-middle attack).

    3.DoS attack: A denial-of-service attack launched by a single attack source, which mainly occupies network resources and forces the target to crash.

    Computer Basics", "Principles of Computer Composition", and "Computer Networks" are three books on computer basics, which are highly recommended for you, and you can have a preliminary understanding of computer things after reading them.

  11. Anonymous users2024-01-27

    Learn what you need to know about cybersecurity:

    1) Familiar with the basic knowledge of computer systems;

    2) Familiar with the basic knowledge of network operating system;

    3) Understand the design and development methods of computer application systems;

    4) Familiar with the basic knowledge of data communication;

    5) Familiar with the basic knowledge of system security and data security;

    6) Master the basic technology of network security and the main security protocols and security systems;

    7) Master the basic principles of computer network architecture and network protocols;

    8) Master the standardization knowledge related to computer networks.

  12. Anonymous users2024-01-26

    Computer literacy, network technology, penetration testing, databases, server technology, and so on.

  13. Anonymous users2024-01-25

    1. Learn programming languages (PHP+MySQL+JS+HTML).

    Reason: PHP+MySQL can help you quickly understand how the BS architecture works, and only by understanding how it works can you really find the problem and the vulnerability. So for those in China who come up and say that they have to infiltrate the training, I despise JS+HTML can help you understand the payload structure of XSS, as well as the DOM-type XSS mining.

    Note that I didn't say that I can't find the xss vulnerability if I can't JS, but I can't construct payload and DOM-type XSS miningLearn the reason for O&M: It will be very useful when it comes to intranet penetration!

    For example, those configuration files are in **, how to view DNS, etc., the operation and maintenance here is not to say anything to learn how to use Linux, but to let you learn how each service is configured, remember where their configuration files are 3Introductory Penetration Learning Path: Inject 2

    XSS vulnerability 3CSRF vulnerability 4File Upload 5

    Resolve vulnerability 6**Execution 7Command execution 8

    The file contains 9The principles of the above vulnerabilities are described in the book "White Hats on Web Security". Note!

    You must learn the first step before you can continue to learn the third step, otherwise you will find that it is useless to buy eggs and you can't understand 4I can't talk about in-depth vulnerabilities, but I can only tell you a piece of advice: the essence of penetration testing is information collection, and the depth is vulnerability development

  14. Anonymous users2024-01-24

    Computer assembly and maintenance, Internet architecture, Web front-end design, Windows Server system usage, Windows Server advanced server architecture, SQL Server database management and application, enterprise network equipment (CISCO), PHP 4 stages, Python core programming, Linux, enterprise network construction and advanced applications, Huawei cloud computing, etc.

Related questions
8 answers2024-02-23

Self-taught Latin dance, I first found a classmate who was interested in learning Latin dance, because it was a beginner, so there was no need to find a dance partner, and it was convenient for everyone to learn together when they encountered problems. >>>More

12 answers2024-02-23

First of all, take good notes, otherwise don't talk about it, and in the third year of high school, the teacher will talk about a lot of knowledge that is not in the textbook. In the first round of review, you can look at the textbook and previous notes, look at the textbook to find the differences, such as some things on the graph, some are marked with words, some are not, you can check the information yourself, and there are people teaching the old textbook to talk about animal and plant cells when there are two endoplasmic reticulos, why mark two? There will be a lot of new discoveries after reading it, and you may be reminded of previous questions at this point. >>>More

7 answers2024-02-23

1 First of all, we must understand what is the big web front-end, and look at the technologies that enterprises are required to master this year. >>>More

9 answers2024-02-23

Keep yours! Ideally, take the time to draw more traditional art basics or human body aspects! Parents should abide by their wishes, but they must not give up their ideals. >>>More

11 answers2024-02-23

Guitar self-taught book "Lai Huidong wrote, from the most basic entry, elementary, intermediate to advanced, and many more**, it is a textbook, and the songs in it are also very good, there are classic old songs, and there are also popular songs.