Answer the question
In order to leave comments, you need to log in
What are the resources for studying the field of "information security"?
I decided to devote myself to the field of information security. Where to start, what books, courses to study? Who in the subject, advise.
Answer the question
In order to leave comments, you need to log in
First of all, you need to understand what exactly you want to do in the field of information security (management or technical side (if so, which one?)
Here are a couple of links that will help you figure it out and decide, information security is a very broad topic:
https://andrepetukhov.wordpress.com
https://www.owasp.org/index.php/Category:OWASP_Web...
www.slideshare.net/jeremiahgrossman/black-hat-08072008
www.slideshare.net/AndreyProzorov
And of course CEH, OSCP certification Google's Help
Web Security 101. Young Fighter's Course
Almost
all resources are in English, but without it you can't dive into IS
.
defense and offense [2016]
V.A.Serdyuk - Organization and technologies of information protection [2011]
V.I. Averchenkov - Information Security Systems in Leading Foreign Countries [2011]
PS And don't forget to learn more about network technologies and operating systems.
Yes, even from here . What part of IB are you interested in to start with?
Be sure to read the "Hacker's Bible". There, about hacking techniques, everything is laid out on the shelves.
CCNA Security read materials for this certification, as an option
You need to know what to read and where to practice.
What to read:
https://webware.biz/
https://kali.tools/
https://hackware.ru/
zalinux.ru
https://defcon.ru/
Where to practice:
https://habrahabr.ru/company /pentestit/blog/261569/
https://xakep.ru/2010/06/03/52289/
KROBER - Fighting bears
VXlab / Blog about virus technologies
Notes to olumnist dukeBarman
Zhora Kornev - one of the authors of inception
Explosive blog bo0om
RussianSecurity
Kaimi / Misc development
raz0r - blog about web security
Sergey Belov's blog
Everyday life of baghunting
DevNulls - Hack and Security
Crazy Assembler - not try this again
Zen of syscoding - Talks about how the system...
thehukker / 1337 Xakep Blog
reverse-pub // reverse everything that starts…
If you need to figure out how encryption algorithms work, the CPU, then you can read the thorium of rings and fields (it has nothing to do with the film The Lord of the Rings) and do not forget elliptic curves.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question