The first stage: computing environment security.
For the operating system, middleware basic operation and security configuration teaching, configuration of real business systems, need to master the Windows operating system security, Linux operating system security, middleware security, database security, PowerShell programming, LinuxShell programming, cryptography applications and other technologies, and be able to operate the operating system and the business system security configuration and security event analysis. The students will be able to configure the operating system and business system for security and analyze security events.
Phase 2: Network Communication Security.
Teaching for network communication security covers network fundamentals, switching protocols, routing protocols, protocol traffic analysis, etc., and is equipped with a carrier-grade network environment to provide basic support for teaching in this department.
This phase requires mastery of network design as well as planning, and network interconnection configuration of network equipment involved in the network, security design of the network structure from the business needs as well as network equipment security configuration.
The instructor will combine the latest security trends and leading security companies or industry security risks to analyze and predict the security market, so that students can be in the learning stage in advance of the security market to connect.
Phase 3: Web Security.
This stage needs to master the Web security vulnerability testing and verification, as well as network security attack ideas and means, skilled use of the knowledge gained in order to defend against them, and master the network security service process.
The fourth stage: penetration testing.
This stage requires mastery of penetration testing and intranet security.
Penetration testing, this stage is mainly to learn the actual combat red team personnel commonly used attack methods and routines, including information collection, system power, intranet forwarding and other knowledge, msf, cs tool use. The course objective allows students to know themselves and their enemies, from the attacker's point of view to examine their own defense vulnerabilities, to help companies in the red and blue confrontation, to defend against real apt attack to achieve good results.
Phase 5: Security Operations.
According to the business needs to master the current common network security equipment and server security configuration and optimization, the use of all the clues obtained in the means of security protection for security event correlation analysis and source analysis, and master network threat intelligence theory and practice, master the threat model establishment, to provide ideas and support for active defense.
This stage of the main learning security reinforcement, level protection, emergency response, risk assessment and other technical knowledge.
Sixth stage: comprehensive combat
This stage of the self-selected project, for the hot industry (party and government, operators, health care, education, energy, transportation, etc.) business systems, data centers, and core nodes of the security operation of the combat; according to the basic requirements of the equal protection 2.0 information systems to provide services to the public **** security testing, risk assessment, security reinforcement and emergency response to security incidents. The company's business is to provide a secure and reliable service to the public.