I
I
imyazip2017-10-26 21:58:44
IT education
imyazip, 2017-10-26 21:58:44

Information security research, where to start?

I want to start studying IB, where would you advise to start?

Answer the question

In order to leave comments, you need to log in

4 answer(s)
V
Vadim Vadim, 2017-10-31
@imyazip

1) If you do not know programming, then I advise you to start with it. Sooner or later you will have to deal with the development of exploits, payloads, maybe even rumors. The choice of languages ​​is huge, but I advise you to start with python. Because it is lightweight, it has thousands of batteries, it has a large community, and most importantly, it allows you to write powerful scripts for pentesting in a short time.
From books I can advise Beginning Python 2005 , or ITVDN courses on youtube.
2) Learn to search for information on your own and don't ask stupid questions.
3) Learn English. This is a very important point, because almost all useful information is stored in an untranslated format.
4) Learn to work with linux systems. Because most of the servers run on linux like systems.
Here is my favorite linux book .
5) Learn to think outside the box and creatively.
6) And the most important point: Do not use your skills for dark deeds!
Here I have described the most important skills that a beginner penetser should have. Of course, all these points are not enough, and there is not enough CI, reverse, knowledge of OS architecture, knowledge of php/mysql/js/html , OSI, ability to work with backtrack tools, etc. But for a teapot, that's it.

S
Stalker_RED, 2017-10-26
@Stalker_RED

From the books of Tanenbaum. And about the architecture of the computer, and about operating systems, and about networks.
https://www.google.com/search?q=tanenbaum+books

V
Valentine, 2017-10-26
@vvpoloskin

Well, from the law

I
igor travov, 2017-10-30
@estj

FROM THE ORANGE BOOK from DOD - I once took it to the State Public Scientific and Technical Library (Kuznetsky Most 16, it seems) ...
The Bell-Lapadula model ..., well, in Maltix, the still living Ken Thomson and his comrades
implemented a similar model (1969) - - like a multilayer file system with discretionary and mandated access methods ... it seems so ...
It's all about the security of the OS and not only,
but if you go from GOSTs, then you need to start with a triad ... you know which one (org-phys - software)....
(sorry, I once wrote a report about this in shaggy 1989),
then our MO published a similar book ....

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question