Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How an information security worker learns to grow by himself

2025-01-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

How does an information security person learn to grow by himself? I provide security consulting services for sensitive units, so I often get "data" from their Traffic Manager or technical director. Regular analysis of data is a very good process of refinement and simplification of skills. This is a very good way of self-growth.

Once you have done the project, you will have a comprehensive understanding of security. What a word of wisdom! The company's servers, network equipment, Web and databases need security assessment, which is a very rare growth opportunity. However, what I have seen is that most security personnel do not dare to do it, for fear that they will not do it well, so they lose the opportunity. As a veteran, I will give you a standard method. Http://www.cspec.gov.cn Ministry of Public Security Information Security Grade Protection Evaluation Center! A security staff is like an athlete, the top priority before the competition is to "be familiar with the rules of the game" and "be familiar with the situation of the opponent". This evaluation center provides you with some very operational PDF documents such as Evaluation Guide, Evaluation criteria, etc. What do they do to you? How? The methods of standardization and compliance are put forward. It is a very possible way before you are not familiar with the industry, do not know how to learn from your foreign counterparts, and do not have your own special way.

At ordinary times, you can also make progress and growth! One thing worth doing every day is to "review the well-known cases of the past". For example, the 2008 MS08-067 RPC overflow vulnerability, SQL injection xpcmd.dll and so on. The growth method given by our ancestors is really convincing to us, which is called "reviewing the old and knowing the new"! Review the loophole and simulate it completely, and the harvest is really "worthy of aftertaste and experience". Of course, if you don't know those cases and how to simulate them, you'd better sign up for a class before you start to grow up. Recommend China soft computer training center! Hehe.

Stay in writing for the time being, more articles are recommended to visit http://cisp.csst.com.cn

Zhang Xiaofeng

China soft computer training Center

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 216

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report